Sciweavers

2399 search results - page 53 / 480
» On Authentication between Human and Computer
Sort
View
BMCBI
2004
140views more  BMCBI 2004»
15 years 1 months ago
What can we learn from noncoding regions of similarity between genomes?
Background: In addition to known protein-coding genes, large amounts of apparently non-coding sequence are conserved between the human and mouse genomes. It seems reasonable to as...
Thomas A. Down, Tim J. P. Hubbard
CSREASAM
2006
15 years 3 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
CHI
2009
ACM
16 years 2 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
PUC
2002
165views more  PUC 2002»
15 years 1 months ago
Touch-Space: Mixed Reality Game Space Based on Ubiquitous, Tangible, and Social Computing
: This paper presents a novel computer entertainment system which recaptures human touch and physical interaction with the real-world environment as essential elements of the game ...
Adrian David Cheok, Xubo Yang, Zhiying Zhou, Mark ...
IWCMC
2010
ACM
15 years 4 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...