Sciweavers

34181 search results - page 186 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
PERCOM
2006
ACM
15 years 10 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
SEUS
2009
IEEE
15 years 5 months ago
Using Context Awareness to Improve Quality of Information Retrieval in Pervasive Computing
Publish-subscribe-query information broker middleware offers great promise to users of pervasive computing systems requiring access to information. However, users of publish-subscr...
Joseph P. Loyall, Richard E. Schantz
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 4 months ago
Fine-Tuning the Human-Computer Interface: Verbal versus Keyboard Input in an Idea Generation Context
Voice recognition technologies are rapidly evolving to help humans interact with computers more efficiently and effectively. Despite their potential advantages, their impact on sy...
Jay J. H. Jung, Clayton A. Looney, Joseph S. Valac...
PPDP
2007
Springer
15 years 4 months ago
Computing with subspaces
We propose a new definition and use of a primitive getAllValues, for computing all the values of a non-deterministic expression in a functional logic program. Our proposal restri...
Sergio Antoy, Bernd Braßel
CEC
2005
IEEE
15 years 4 months ago
Dynamic salting route optimisation using evolutionary computation
Abstract- On marginal winter nights, highway authorities face a difficult decision as to whether or not to salt the road network. The consequences of making a wrong decision are s...
Hisashi Handa, Lee Chapman, Xin Yao