Sciweavers

4013 search results - page 135 / 803
» computer 2002
Sort
View
124
Voted
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 8 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
133
Voted
NPL
2002
103views more  NPL 2002»
15 years 3 months ago
Emergence of Orienting Behavior in Ecological Neural Networks
Weinvestigatedthe emergenceoforientingbehavior in arti
Paolo Bartolomeo, Luigi Pagliarini, Domenico Paris...
ISWC
2002
IEEE
15 years 8 months ago
Micro-Accelerometer Based Hardware Interfaces for Wearable Computer Mixed Reality Applications
Human interaction with wearable computers is an important research issue, especially when combined with mixed reality (MR) applications. Natural and non-obtrusive means of interac...
Adrian David Cheok, Krishnamoorthy Ganesh Kumar, S...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 3 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
ISWC
2002
IEEE
15 years 8 months ago
Time and Time Again: Parallels in the Development of the Watch and the Wearable Computer
This paper examines the parallels in the development of the watch and the wearable computer. It discusses how the locations where the watch was worn on the body has changed over t...
Thomas L. Martin