Sciweavers

2399 search results - page 151 / 480
» On Authentication between Human and Computer
Sort
View
MM
2009
ACM
199views Multimedia» more  MM 2009»
15 years 10 months ago
Beyond flat surface computing: challenges of depth-aware and curved interfaces
In the past decade, multi-touch-sensitive interactive surfaces have transitioned from pure research prototypes in the lab, to commercial products with wide-spread adoption. One of...
Hrvoje Benko
175
Voted
WWW
2011
ACM
14 years 11 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
133
Voted
ECBS
2005
IEEE
88views Hardware» more  ECBS 2005»
15 years 9 months ago
Integrative Architecture Elicitation for Large Computer Based Systems
Large and complex computer based systems are the result of an evolution process which may take many years. Heterogeneity is an important characteristic of such systems: During the...
Peter Tabeling, Bernhard Gröne
BMCBI
2010
106views more  BMCBI 2010»
15 years 4 months ago
A computational evaluation of over-representation of regulatory motifs in the promoter regions of differentially expressed genes
Background: Observed co-expression of a group of genes is frequently attributed to co-regulation by shared transcription factors. This assumption has led to the hypothesis that pr...
Guofeng Meng, Axel Mosig, Martin Vingron
CCS
2007
ACM
15 years 10 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...