Sciweavers

1727 search results - page 323 / 346
» human 2005
Sort
View
SOSP
2005
ACM
15 years 8 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
ITICSE
2006
ACM
15 years 5 months ago
Gender gap in computer science does not exist in one former soviet republic: results of a study
It is well known that women’s involvement in the field of Computer Science is very low in the USA. This is viewed as a significant problem and has become a great concern to educ...
Hasmik Gharibyan, Stephan Gunsaulus
ACSAC
2005
IEEE
15 years 5 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
AVSS
2005
IEEE
15 years 5 months ago
Hypovigilence analysis: open or closed eye or mouth? Blinking or yawning frequency?
This paper proposes a frequency method to estimate the state open or closed of eye and mouth and to detect associated motion events such as blinking and yawning. The context of th...
Alexandre Benoit, Alice Caplier
CSB
2005
IEEE
168views Bioinformatics» more  CSB 2005»
15 years 5 months ago
cis-Regulatory Element Prediction in Mammalian Genomes
The identification of cis-regulatory elements and modules is an important step in understanding the regulation of genes. We have developed a pipeline capable of running multiple m...
Asim S. Siddiqui, Gordon Robertson, Misha Bilenky,...