Sciweavers

6300 search results - page 923 / 1260
» We have it easy, but do we have it right
Sort
View
ASSETS
2006
ACM
15 years 5 months ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
DCOSS
2006
Springer
15 years 5 months ago
Y-Threads: Supporting Concurrency in Wireless Sensor Networks
Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
Christopher Nitta, Raju Pandey, Yann Ramin
DEXA
2006
Springer
113views Database» more  DEXA 2006»
15 years 5 months ago
Dynamic Range Query in Spatial Network Environments
Moving range queries over mobile objects are important in many location management applications. There have been quite a few research works in this area. However, all existing solu...
Fuyu Liu, Tai T. Do, Kien A. Hua
ESORICS
2006
Springer
15 years 5 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
125
Voted
FGR
2006
IEEE
255views Biometrics» more  FGR 2006»
15 years 5 months ago
Incremental Kernel SVD for Face Recognition with Image Sets
Non-linear subspaces derived using kernel methods have been found to be superior compared to linear subspaces in modeling or classification tasks of several visual phenomena. Such...
Tat-Jun Chin, Konrad Schindler, David Suter