Sciweavers

8468 search results - page 1485 / 1694
» The Technology of Data Stashing
Sort
View
109
Voted
UAIS
2008
185views more  UAIS 2008»
14 years 10 months ago
Facial movement analysis in ASL
In the age of speech and voice recognition technologies, sign language recognition is an essential part of ensuring equal access for deaf people. To date, sign language recognition...
Christian Vogler, Siome Goldenstein
URBAN
2008
90views more  URBAN 2008»
14 years 10 months ago
The use of Web 2.0 concepts to support deliberation in spatial decision-making
Technologies associated with the second-generation of the World-Wide Web enable virtually anyone to share their data, documents, observations, and opinions on the Internet. In les...
Claus Rinner, Carsten Keßler, Stephen Andrul...
73
Voted
CCR
2004
84views more  CCR 2004»
14 years 10 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
COMPUTER
2004
80views more  COMPUTER 2004»
14 years 10 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
COMPUTER
2004
162views more  COMPUTER 2004»
14 years 10 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
« Prev « First page 1485 / 1694 Last » Next »