• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 20,715
Next 10 →

Understanding and Using Context

by Anind K. Dey - Personal and Ubiquitous Computing , 2001
"... Context is a poorly used source of information in our computing environments. As a result, we have an impoverished understanding of what context is and how it can be used. In this paper, we provide an operational definition of context and discuss the different ways that context can be used by contex ..."
Abstract - Cited by 865 (0 self) - Add to MetaCart
Context is a poorly used source of information in our computing environments. As a result, we have an impoverished understanding of what context is and how it can be used. In this paper, we provide an operational definition of context and discuss the different ways that context can be used

Ecology of the family as a context for human development: Research perspectives.

by Urie Bronfenbrenner , Josephine Arastah , Mavis Hetherington , Richard Lerner , Jeylan T Mortimer , Joseph H Pleck , Lea Pulkinnen , Michael Rutter , Klaus Schneewind , Diana Slaughter - Developmental Psychology, , 1986
"... This review collates and examines critically a theoretically convergent but widely dispersed body of research on the influence of external environments on the functioning of families as contexts of human development. Investigations falling within this expanding domain include studies of the interac ..."
Abstract - Cited by 518 (0 self) - Add to MetaCart
This review collates and examines critically a theoretically convergent but widely dispersed body of research on the influence of external environments on the functioning of families as contexts of human development. Investigations falling within this expanding domain include studies

Real-Time Dynamic Voltage Scaling for Low-Power Embedded Operating Systems

by Padmanabhan Pillai, Kang G. Shin , 2001
"... In recent years, there has been a rapid and wide spread of nontraditional computing platforms, especially mobile and portable computing devices. As applications become increasingly sophisticated and processing power increases, the most serious limitation on these devices is the available battery lif ..."
Abstract - Cited by 501 (4 self) - Add to MetaCart
the necessary peak computation power in general-purpose systems. However, for a large class of applications in embedded real-time systems like cellular phones and camcorders, the variable operating frequency interferes with their deadline guarantee mechanisms, and DVS in this context, despite its growing

I. The Operational Context....................................................1

by Kenneth Allard Dedication, Gary I. Gordon, Sergeant First Class R, All D. Shughart
"... This book is respectfully dedicated to the memories of Master Sergeant ..."
Abstract - Add to MetaCart
This book is respectfully dedicated to the memories of Master Sergeant

Iris Quality in an Operational Context

by James S. Doyle, Patrick J. Flynn
"... The accuracy of an iris biometrics system increases with the quality of the sample used for identification. All current iris biometrics systems capture data streams that must be pro-cessed to identify a single, ideal image to be used for iden-tification. Many metrics exist to evaluate the quality of ..."
Abstract - Add to MetaCart
The accuracy of an iris biometrics system increases with the quality of the sample used for identification. All current iris biometrics systems capture data streams that must be pro-cessed to identify a single, ideal image to be used for iden-tification. Many metrics exist to evaluate the quality of an iris image. This paper introduces a method for determin-ing the ideal iris image from a set of iris images by using an iris-matching algorithm in a feedback loop to examine the set of true matches. This proposed method is shown to out-perform other methods currently used for selecting an ideal image from a set of iris images.

System architecture directions for networked sensors

by Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister - IN ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS , 2000
"... Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the physical world or spread throughout our environment. The missing elements are an overall system architecture and a methodo ..."
Abstract - Cited by 1789 (58 self) - Add to MetaCart
methodology for systematic advance. To this end, we identify key requirements, develop a small device that is representative of the class, design a tiny event-driven operating system, and show that it provides support for efficient modularity and concurrency-intensive operation. Our operating system fits

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
is preserved under a general protocol composition operation, called universal composition. The proposed framework with its security-preserving composition operation allows for modular design and analysis of complex cryptographic protocols from relatively simple building blocks. Moreover, within this framework

Toolglass and magic lenses: The see-through interface

by Eric A. Bier, Maureen C. Stone, Ken Pier, William Buxton, Tony D. Derose , 1993
"... Toolglass ™ widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positioned with one hand while the other positions the cursor. The widgets provide a rich and concise vocabulary for operating on ..."
Abstract - Cited by 506 (8 self) - Add to MetaCart
. In addition, lenses provide rich context-dependent feedback and the ability to view details and context simultaneously. Our widgets and lenses can be combined to form operation and viewing macros, and can be used over multiple applications.

Concurrent Constraint Programming

by Vijay A. Saraswat, Martin Rinard , 1993
"... This paper presents a new and very rich class of (con-current) programming languages, based on the notion of comput.ing with parhal information, and the con-commitant notions of consistency and entailment. ’ In this framework, computation emerges from the inter-action of concurrently executing agent ..."
Abstract - Cited by 502 (16 self) - Add to MetaCart
agents that communi-cate by placing, checking and instantiating constraints on shared variables. Such a view of computation is in-teresting in the context of programming languages be-cause of the ability to represent and manipulate partial information about the domain of discourse, in the con-text

Thresholding of statistical maps in functional neuroimaging using the false discovery rate.

by Christopher R Genovese , Nicole A Lazar , Thomas Nichols - NeuroImage , 2002
"... Finding objective and effective thresholds for voxelwise statistics derived from neuroimaging data has been a long-standing problem. With at least one test performed for every voxel in an image, some correction of the thresholds is needed to control the error rates, but standard procedures for mult ..."
Abstract - Cited by 521 (9 self) - Add to MetaCart
for multiple hypothesis testing (e.g., Bonferroni) tend to not be sensitive enough to be useful in this context. This paper introduces to the neuroscience literature statistical procedures for controlling the false discovery rate (FDR). Recent theoretical work in statistics suggests that FDR
Next 10 →
Results 1 - 10 of 20,715
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University