Sciweavers

922 search results - page 150 / 185
» We need a research data census
Sort
View
WISEC
2010
ACM
15 years 21 days ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
120
Voted
BMCBI
2008
130views more  BMCBI 2008»
15 years 19 days ago
An enhanced partial order curve comparison algorithm and its application to analyzing protein folding trajectories
Background: Understanding how proteins fold is essential to our quest in discovering how life works at the molecular level. Current computation power enables researchers to produc...
Hong Sun, Hakan Ferhatosmanoglu, Motonori Ota, Yus...
KI
2002
Springer
15 years 5 days ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
132
Voted
MVA
2002
186views Computer Vision» more  MVA 2002»
15 years 5 days ago
Identifying Body Parts of Multiple People in Multi-Camera Images
In order to track and recognize the movements of multiple people using multiple cameras, each person needs to be segmented and identified in the image of each camera. We propose a...
Masafumi Tominaga, Hitoshi Hongo, Hiroyasu Koshimi...
154
Voted
PLDI
2003
ACM
15 years 5 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik