Sciweavers

198 search results - page 29 / 40
» Flexible Modeling of Emergency Scenarios using Reconfigurabl...
Sort
View
109
Voted
ACSAC
2009
IEEE
15 years 3 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
84
Voted
CARS
2004
15 years 1 months ago
Haptic interaction in VR-based paracentesis simulation for dexterity enhancement and assessment
In this paper we describe the development of an interactive virtual reality (VR) system that aims to realistically simulate specific paracentesis clinical procedures (particularly ...
Costas S. Tzafestas, Yiannis Koumpouros, Kostas Bi...
ACSAC
1999
IEEE
15 years 4 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
83
Voted
WWW
2008
ACM
16 years 10 days ago
Personalized web exploration with task models
Personalized Web search has emerged as one of the hottest topics for both the Web industry and academic researchers. However, the majority of studies on personalized search focuse...
Jae-wook Ahn, Peter Brusilovsky, Daqing He, Jonath...
96
Voted
SIGSOFT
2007
ACM
16 years 12 days ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...