Sciweavers

11234 search results - page 2089 / 2247
» A Microsurgery Simulation System
Sort
View
CL
2010
Springer
14 years 10 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CGF
2008
151views more  CGF 2008»
14 years 10 months ago
Reconstructing head models from photographs for individualized 3D-audio processing
Visual fidelity and interactivity are the main goals in Computer Graphics research, but recently also audio is assuming an important role. Binaural rendering can provide extremely...
Matteo Dellepiane, Nico Pietroni, Tsingos Tsingos,...
96
Voted
AHSWN
2006
206views more  AHSWN 2006»
14 years 10 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
93
Voted
FGCS
2008
103views more  FGCS 2008»
14 years 10 months ago
A case for cooperative and incentive-based federation of distributed clusters
Research interest in Grid computing has grown significantly over the past five years. Management of distributed resources is one of the key issues in Grid computing. Central to ma...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
GRID
2008
Springer
14 years 10 months ago
Can Economics-based Resource Allocation Prove Effective in a Computation Marketplace?
Several companies offer computation on demand for a fee. More companies are expected to enter this business over the next decade, leading to a marketplace for computation resource...
Kevin L. Mills, Christopher Dabrowski
« Prev « First page 2089 / 2247 Last » Next »