Sciweavers

2371 search results - page 46 / 475
» Using wearable computing solutions in real-world application...
Sort
View
CIA
2008
Springer
15 years 1 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
ICOIN
2001
Springer
15 years 4 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 4 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
VMV
2008
122views Visualization» more  VMV 2008»
15 years 1 months ago
Statistical analysis of Multi-Material Components using Dual Energy CT
This work describes a novel method for statistical analysis of multi-material components. The application scenario is industrial 3D X-ray computed tomography, emphasizing metrolog...
Christoph Heinzl, Johann Kastner, Torsten Möl...
CVPR
2008
IEEE
15 years 6 months ago
View and scale invariant action recognition using multiview shape-flow models
Actions in real world applications typically take place in cluttered environments with large variations in the orientation and scale of the actor. We present an approach to simult...
Pradeep Natarajan, Ram Nevatia