Sciweavers

1456 search results - page 11 / 292
» Keeping encountered information
Sort
View
CODES
2007
IEEE
15 years 4 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
AMR
2006
Springer
108views Multimedia» more  AMR 2006»
15 years 1 months ago
Variation of Relevance Assessments for Medical Image Retrieval
Abstract. Evaluation is crucial for the success of most research domains, and image retrieval is no exception to this. Recently, several benchmarks have been developed for visual i...
Henning Müller, Paul Clough, William R. Hersh...
INTERACT
2003
14 years 11 months ago
How Do People Get Back to Information on the Web? How Can They Do It Better?
: In one study, people are observed to keep web information for later use through many different methods including the use of Bookmarks (or Favorites), self-addressed email, hand-w...
William P. Jones, Harry Bruce, Susan T. Dumais
CGF
2005
147views more  CGF 2005»
14 years 10 months ago
GPU Simulation and Rendering of Volumetric Effects for Computer Games and Virtual Environments
As simulation and rendering capabilities continue to increase, volumetric effects like smoke, fire or explosions will be frequently encountered in computer games and virtual envir...
Jens Krüger, Rüdiger Westermann
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 3 months ago
It's More than Just Use: An Investigation of Telemedicine Use Quality
Many information systems (IS) studies portray use as an indicator of system success. However, “simply saying that more use will yield more benefits without considering the natur...
Cynthia LeRouge, Alan R. Hevner