Sciweavers

561 search results - page 69 / 113
» How to operate a PC without using the hands
Sort
View
NN
2006
Springer
122views Neural Networks» more  NN 2006»
15 years 1 months ago
Goals and means in action observation: A computational approach
Many of our daily activities are supported by behavioural goals that guide the selection of actions, which allow us to reach these goals effectively. Goals are considered to be im...
Raymond H. Cuijpers, Hein T. van Schie, Mathieu Ko...
SADFE
2010
IEEE
14 years 11 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
EUROSYS
2009
ACM
15 years 10 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 3 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
GLOBECOM
2008
IEEE
15 years 1 months ago
Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency
Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these ...
G. Bhatti, A. Mehta, Zafer Sahinoglu, J. Zhang, R....