Sciweavers

2399 search results - page 53 / 480
» On Authentication between Human and Computer
Sort
View
BMCBI
2004
140views more  BMCBI 2004»
14 years 9 months ago
What can we learn from noncoding regions of similarity between genomes?
Background: In addition to known protein-coding genes, large amounts of apparently non-coding sequence are conserved between the human and mouse genomes. It seems reasonable to as...
Thomas A. Down, Tim J. P. Hubbard
CSREASAM
2006
14 years 11 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
CHI
2009
ACM
15 years 10 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
PUC
2002
165views more  PUC 2002»
14 years 9 months ago
Touch-Space: Mixed Reality Game Space Based on Ubiquitous, Tangible, and Social Computing
: This paper presents a novel computer entertainment system which recaptures human touch and physical interaction with the real-world environment as essential elements of the game ...
Adrian David Cheok, Xubo Yang, Zhiying Zhou, Mark ...
IWCMC
2010
ACM
14 years 11 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...