Sciweavers

1566 search results - page 78 / 314
» Contification Using Dominators
Sort
View
IHI
2010
142views Healthcare» more  IHI 2010»
14 years 4 months ago
Exploring the use of technology in healthcare spaces and its impact on empathic communication
As computing technologies in examination rooms become a more pervasive and dominant part of the healthcare experience, those technologies can disrupt the flow of information and e...
Amanda Fonville, Eun Kyoung Choe, Susan Oldham, Ju...
TVLSI
2010
14 years 4 months ago
Improving Multi-Level NAND Flash Memory Storage Reliability Using Concatenated BCH-TCM Coding
By storing more than one bit in each memory cell, multi-level per cell (MLC) NAND flash memories are dominating global flash memory market due to their appealing storage density ad...
Shu Li, Tong Zhang
CHI
2011
ACM
14 years 1 months ago
Your noise is my command: sensing gestures using the body as an antenna
Touch sensing and computer vision have made humancomputer interaction possible in environments where keyboards, mice, or other handheld implements are not available or desirable. ...
Gabe Cohn, Daniel Morris, Shwetak N. Patel, Desney...
SSPR
1998
Springer
15 years 2 months ago
Semantic Content Based Image Retrieval Using Object-Process Diagrams
Abstract. The increase in accessability to on-line visual data has promoted the interest in browsing and retrieval of images from Image Databases. Current approaches assume either ...
Dov Dori, Hagit Zabrodsky Hel-Or
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 1 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan