Sciweavers

3544 search results - page 663 / 709
» Information Security in Open Systems
Sort
View
89
Voted
TEI
2012
ACM
225views Hardware» more  TEI 2012»
13 years 6 months ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson
WWW
2002
ACM
15 years 11 months ago
The structure of broad topics on the web
The Web graph is a giant social network whose properties have been measured and modeled extensively in recent years. Most such studies concentrate on the graph structure alone, an...
Soumen Chakrabarti, Mukul Joshi, Kunal Punera, Dav...
79
Voted
IRI
2006
IEEE
15 years 4 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law
91
Voted
ELPUB
2006
ACM
15 years 4 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier
81
Voted
IWMM
2004
Springer
98views Hardware» more  IWMM 2004»
15 years 4 months ago
Dynamic object sampling for pretenuring
Many state-of-the-art garbage collectors are generational, collecting the young nursery objects more frequently than old objects. These collectors perform well because young objec...
Maria Jump, Stephen M. Blackburn, Kathryn S. McKin...