Sciweavers

2726 search results - page 454 / 546
» Application security support in the operating system kernel
Sort
View
CVRMED
1997
Springer
15 years 2 months ago
An approach to 2D/3D registration of a vertebra in 2D X-ray fluoroscopies with 3D CT images
In order to use pre-operative images during an operation for navigation, they must be registered to the patient's coordinate system in the operating theater or to an intra-ope...
Jürgen Weese, Thorsten M. Buzug, Cristian Lor...
CAL
2006
14 years 10 months ago
User-Driven Frequency Scaling
Abstract-- We propose and evaluate User-Driven Frequency Scaling (UDFS) for improved power management on processors that support Dynamic Voltage and Frequency Scaling (DVFS), e.g, ...
Arindam Mallik, Bin Lin, Gokhan Memik, Peter A. Di...
SACMAT
2005
ACM
15 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
ACMSE
2006
ACM
15 years 3 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...