Sciweavers

5333 search results - page 436 / 1067
» Optimizing Computer System Configurations
Sort
View
CRITICAL
2005
15 years 7 months ago
Palpable time for heterogeneous care communities
This paper describes an ongoing design experience conducted in the Neonatal Intensive Care Unit for Premature Newborns. The specificity and the delicateness of such a setting prov...
Erik Grönvall, Patrizia Marti, Alessandro Pol...
TOG
2002
162views more  TOG 2002»
15 years 4 months ago
Jigsaw image mosaics
This paper introduces a new kind of mosaic, called Jigsaw Image Mosaic (JIM), where image tiles of arbitrary shape are used to compose the final picture. The generation of a Jigsa...
Junhwan Kim, Fabio Pellacini
PERCOM
2004
ACM
16 years 4 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
106
Voted
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
146
Voted
TASLP
2008
106views more  TASLP 2008»
15 years 5 months ago
Multipitch Analysis of Polyphonic Music and Speech Signals Using an Auditory Model
A method is described for estimating the fundamental frequencies of several concurrent sounds in polyphonic music and multiple-speaker speech signals. The method consists of a comp...
Anssi Klapuri