Sciweavers

1242 search results - page 225 / 249
» Digital Objects as Passwords
Sort
View
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 3 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
UIST
2006
ACM
15 years 3 months ago
ModelCraft: capturing freehand annotations and edits on physical 3D models
With the availability of affordable new desktop fabrication techniques such as 3D printing and laser cutting, physical models are used increasingly often during the architectural ...
Hyunyoung Song, François Guimbretièr...
ICDAR
2005
IEEE
15 years 3 months ago
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons
Automatic text recognition from natural images receives a growing attention because of potential applications in image retrieval, robotics and intelligent transport system. Camera...
Nobuo Ezaki, Kimiyasu Kiyota, Bui Truong Minh, Mar...
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
KCAP
2005
ACM
15 years 3 months ago
Semantic Association of Taxonomy-based Standards Using Ontology
The vision of semantic interoperability, the fluid sharing of digitalized knowledge, has led much research on ontology/schema mapping/aligning. Although this line of research is f...
Hung-Ju Chu, Randy Y. C. Chow, Su-Shing Chen, Raja...