Sciweavers

8658 search results - page 1471 / 1732
» Models of Command and Control
Sort
View
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 11 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
ISBI
2009
IEEE
15 years 11 months ago
Transrectal Ultrasound Prostate Biopsy Tracking with Efficient and Accurate Deformation Estimation
Prostate cancer is the most frequent cancer for men and the second cause of cancer death. Confirmation of cancer requires transrectal prostate biopsies. Tracking systems for tran...
Michael Baumann, Pierre Mozer, Vincent Daanen, Joc...
CCS
2009
ACM
15 years 11 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CSE
2009
IEEE
15 years 11 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
DATE
2009
IEEE
148views Hardware» more  DATE 2009»
15 years 11 months ago
Visual quality analysis for dynamic backlight scaling in LCD systems
—With the trend toward high-quality large form factor displays on high-end handhelds, LCD backlight accounts for a significant and increasing percentage of the total energy budg...
Andrea Bartolini, Martino Ruggiero, Luca Benini
« Prev « First page 1471 / 1732 Last » Next »