Sciweavers

1611 search results - page 296 / 323
» An Access Control Model for Video Database Systems
Sort
View
IUI
2010
ACM
15 years 6 months ago
Haptic augmented reality dental trainer with automatic performance assessment
We developed an augmented reality (AR) dental training simulator utilizing a haptic (force feedback) device. A number of dental procedures such as crown preparation and opening ac...
Phattanapon Rhienmora, Kugamoorthy Gajananan, Pete...
APN
2004
Springer
15 years 1 months ago
Web Supported Enactment of Petri-Net Based Workflows with XRL/Flower
This paper describes concepts and features of a Web-based system called XRL/flower for carrying out Petri-net based workflows described with XRL (eXchangeable Routing Language). XR...
Alexander Norta
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
WWW
2006
ACM
15 years 10 months ago
Semantic link based top-K join queries in P2P networks
An important issue arising from Peer-to-Peer applications is how to accurately and efficiently retrieve a set of K best matching data objects from different sources while minimizi...
Jie Liu, Liang Feng, Chao He