Sciweavers

5722 search results - page 888 / 1145
» Security Function Interactions
Sort
View
IWRIDL
2006
ACM
158views Education» more  IWRIDL 2006»
15 years 10 months ago
Document image analysis for digital libraries
Digital Libraries have many forms – institutional libraries for information dissemination, document repositories for recordkeeping, and personal digital libraries for organizing...
Prateek Sarkar
ICALT
2005
IEEE
15 years 9 months ago
Integrating Wireless Technology in Pocket Electronic Dictionary to Enhance Language Learning
We believe that with regard to the information technology applications in education, one student one computing device will be the future and long-term trend. Many related studies ...
Jen-Kai Liang, Tzu-Chien Liu, Hsue-Yie Wang, Tak-W...
ICDCS
2005
IEEE
15 years 9 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
HT
2005
ACM
15 years 9 months ago
Activity links: supporting communication and reflection about action
Tasks that take place over a long period of time or collaborative tasks where participants are required to develop an understanding of each other’s effort benefit from better co...
Hao-wei Hsieh, Frank M. Shipman III
ICAPR
2005
Springer
15 years 9 months ago
Unsupervised Markovian Segmentation on Graphics Hardware
Abstract. This contribution shows how unsupervised Markovian segmentation techniques can be accelerated when implemented on graphics hardware equipped with a Graphics Processing Un...
Pierre-Marc Jodoin, Jean-François St-Amour,...