Sciweavers

10790 search results - page 2107 / 2158
» Using feature models to automate model transformations
Sort
View
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
WWW
2009
ACM
16 years 5 months ago
A flight meta-search engine with metamorph
We demonstrate a flight meta-search engine that is based on the Metamorph framework. Metamorph provides mechanisms to model web forms together with the interactions which are need...
Bernhard Krüpl, Wolfgang Holzinger, Yansen Da...
CHI
2008
ACM
16 years 4 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig
POPL
2006
ACM
16 years 4 months ago
Autolocker: synchronization inference for atomic sections
The movement to multi-core processors increases the need for simpler, more robust parallel programming models. Atomic sections have been widely recognized for their ease of use. T...
Bill McCloskey, Feng Zhou, David Gay, Eric A. Brew...
TEI
2010
ACM
147views Hardware» more  TEI 2010»
15 years 11 months ago
A robust and accurate 3d hand posture estimation method for interactive systems
In this paper, a new 3D hand posture estimation system using a single camera and 3 interactive systems are introduced. Existing hand gesture recognition systems estimate hand'...
Emi Tamaki
« Prev « First page 2107 / 2158 Last » Next »