Sciweavers

7195 search results - page 1197 / 1439
» On Computing Power
Sort
View
ESMART
2001
Springer
15 years 9 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
CVPR
2000
IEEE
15 years 9 months ago
Step towards Sequence-to-Sequence Alignment
This paper presents an approach for establishing correspondencesin time and in space between two differentvideo sequences of the same dynamic scene, recorded by stationary uncalib...
Yaron Caspi, Michal Irani
UIST
2000
ACM
15 years 9 months ago
Sensing techniques for mobile interaction
We describe sensing techniques motivated by unique aspects of human-computer interaction with handheld devices in mobile settings. Special features of mobile interaction include c...
Ken Hinckley, Jeffrey S. Pierce, Mike Sinclair, Er...
VRML
2000
ACM
15 years 9 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick
PLDI
1999
ACM
15 years 9 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
« Prev « First page 1197 / 1439 Last » Next »