Sciweavers

2413 search results - page 300 / 483
» Models for universal usability
Sort
View
102
Voted
JCP
2006
120views more  JCP 2006»
15 years 21 days ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
102
Voted
MVA
2008
196views Computer Vision» more  MVA 2008»
15 years 20 days ago
Evaluation of an appearance-based 3D face tracker using dense 3D data
The ability to detect and track human heads and faces in video sequences can be considered as the finest level of any video surveillance system. In this paper, we introduce a gener...
Fadi Dornaika, Angel Domingo Sappa
134
Voted
PERVASIVE
2006
Springer
15 years 19 days ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
SAC
2006
ACM
15 years 19 days ago
A domain-specific language for task handlers generation, applying discrete controller synthesis
We propose a simple programming language, called Nemo, specific to the domain of multi-task real-time embedded systems, such as in robotic, automotive or avionics systems. It can ...
Gwenaël Delaval, Éric Rutten
86
Voted
IJMI
2007
134views more  IJMI 2007»
15 years 19 days ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll