Sciweavers

2173 search results - page 417 / 435
» The History of the History of Software
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 9 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
CORR
2007
Springer
109views Education» more  CORR 2007»
14 years 9 months ago
Delayed Sequential Coding of Correlated Sources
— Motivated by video coding applications, we study the problem of sequential coding of correlated sources with (noncausal) encoding and/or decoding frame-delays. The fundamental ...
Nan Ma, Ye Wang, Prakash Ishwar
72
Voted
IJVR
2006
116views more  IJVR 2006»
14 years 9 months ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
ISI
2006
Springer
14 years 9 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
DEBU
2007
211views more  DEBU 2007»
14 years 9 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan