Sciweavers

729 search results - page 97 / 146
» in touch
Sort
View
105
Voted
SAC
2006
ACM
15 years 6 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
ICMCS
2005
IEEE
100views Multimedia» more  ICMCS 2005»
15 years 6 months ago
A Player-Possession Acquisition System for Broadcast Soccer Video
A semi-auto system is developed to acquire playerpossession for broadcast soccer video, whose objective is to minimize the manual work. This research is important because acquirin...
Xinguo Yu, Tze Sen Hay, Xin Yan, Engsiong Chng
IEEEPACT
2005
IEEE
15 years 6 months ago
Performance Analysis of System Overheads in TCP/IP Workloads
Current high-performance computer systems are unable to saturate the latest available high-bandwidth networks such as 10 Gigabit Ethernet. A key obstacle in achieving 10 gigabits ...
Nathan L. Binkert, Lisa R. Hsu, Ali G. Saidi, Rona...
88
Voted
ISM
2005
IEEE
112views Multimedia» more  ISM 2005»
15 years 6 months ago
Automatically Generating User Interfaces for Device Federations
One of the ideas of ubiquitous computing is that computing resources should be embedded ubiquitously in the environment, making them available to any nearby users. Some researcher...
Elmar Braun, Max Mühlhäuser
IV
2005
IEEE
130views Visualization» more  IV 2005»
15 years 6 months ago
A Comparison of Visual and Haptic Object Representations Based on Similarity
Do we judge similarity between two objects to be the same using touch and vision? We investigated this using psychophysical experiments in which subjects rated the similarity betw...
Theresa Cooke, Christian Wallraven, Heinrich H. B&...