Sciweavers

6812 search results - page 1265 / 1363
» Detection of Information Flows
Sort
View
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 1 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
117
Voted
CHI
2004
ACM
16 years 1 months ago
Trading design spaces: exchanging ideas on physical design environments
Physical design environments are places that support people engaged in the spatial, physical, tangible act of creation. It is now possible to augment workspaces with an amazing ar...
Wendy Ju, Margot Brereton, Michael Haller, Amanda ...
CHI
2004
ACM
16 years 1 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
POPL
2008
ACM
16 years 1 months ago
Automatic inference of stationary fields: a generalization of java's final fields
Java programmers can document that the relationship between two objects is unchanging by declaring the field that encodes that relationship to be final. This information can be us...
Christopher Unkel, Monica S. Lam
ICSE
2007
IEEE-ACM
16 years 1 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
« Prev « First page 1265 / 1363 Last » Next »