Sciweavers

9732 search results - page 1905 / 1947
» Modelling Adaptivity with Aspects
Sort
View
123
Voted
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
15 years 9 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
130
Voted
ASSETS
2006
ACM
15 years 9 months ago
American sign language recognition in game development for deaf children
CopyCat is an American Sign Language (ASL) game, which uses gesture recognition technology to help young deaf children practice ASL skills. We describe a brief history of the game...
Helene Brashear, Valerie L. Henderson, Kwang-Hyun ...
CASES
2006
ACM
15 years 9 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
136
Voted
CONEXT
2006
ACM
15 years 9 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
183
Voted
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 9 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
« Prev « First page 1905 / 1947 Last » Next »