Sciweavers

828 search results - page 134 / 166
» A framework for spyware assessment
Sort
View
CBMS
2006
IEEE
15 years 8 months ago
Machine Learning Techniques to Enable Closed-Loop Control in Anesthesia
The growing availability of high throughput measurement devices in the operating room makes possible the collection of a huge amount of data about the state of the patient and the...
Olivier Caelen, Gianluca Bontempi, Eddy Coussaert,...
CGI
2006
IEEE
15 years 8 months ago
MIP-Guided Vascular Image Visualization with Multi-Dimensional Transfer Function
Direct volume rendering (DVR) is an effective way to visualize 3D vascular images for diagnosis of different vascular pathologies and planning of surgical treatments. Angiograms ar...
Ming-Yuen Chan, Yingcai Wu, Huamin Qu, Albert C. S...
NOMS
2006
IEEE
15 years 8 months ago
Self-Adaptive SLA-Driven Capacity Management for Internet Services
— This work considers the problem of hosting multiple third-party Internet services in a cost-effective manner so as to maximize a provider’s business objective. For this purpo...
Bruno D. Abrahao, Virgilio Almeida, Jussara M. Alm...
TABLETOP
2006
IEEE
15 years 8 months ago
Gesture Registration, Relaxation, and Reuse for Multi-Point Direct-Touch Surfaces
Freehand gestural interaction with direct-touch computation surfaces has been the focus of significant research activity recently. While many interesting gestural interaction tech...
Mike Wu, Chia Shen, Kathy Ryall, Clifton Forlines,...
WETICE
2006
IEEE
15 years 8 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...