Sciweavers

6560 search results - page 1199 / 1312
» The Human Context of Information Systems
Sort
View
HAPTICS
2007
IEEE
15 years 4 months ago
Surface Interrogation Methods for Haptic Rendering of Virtual Objects
The process which enables virtual objects to mimic their real world counterparts is known as realistic rendering in haptics. Realistic sensations could relate to any spatial featu...
Anusha Sridaran, Dianne Hansford, Kanav Kahol, Set...
ICASSP
2007
IEEE
15 years 4 months ago
Using Structural Similarity Quality Metrics to Evaluate Image Compression Techniques
Perceptual image quality metrics have explicitly accounted for perceptual characteristics of the human visual system (HVS) by modeling sensitivity to subband noise as the just-not...
Alan C. Brooks, Thrasyvoulos N. Pappas
ICDE
2007
IEEE
121views Database» more  ICDE 2007»
15 years 4 months ago
Dispatching Hospitals Intelligently: A Service-Oriented Approach
Emergencies happen frequently and handling them effectively is necessary. In many cases, emergencies are treated by a static procedure, without considering the requirements of th...
Oguz Akgus, Serdar Torgan, Anil Gürsel, Emre ...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
CCS
2007
ACM
15 years 4 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
« Prev « First page 1199 / 1312 Last » Next »