Sciweavers

452 search results - page 87 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
ASPLOS
2006
ACM
15 years 3 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
73
Voted
CHI
2004
ACM
15 years 10 months ago
Single-handed interaction techniques for multiple pressure-sensitive strips
We present a set of interaction techniques that make novel use of a small pressure-sensitive pad to allow one-handed direct control of a large number of parameters. The surface of...
Gábor Blaskó, Steven Feiner
CBMS
2007
IEEE
15 years 4 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
MIR
2003
ACM
161views Multimedia» more  MIR 2003»
15 years 2 months ago
Highlight scene extraction in real time from baseball live video
This paper proposes a method to automatically extract highlight scenes from sports (baseball) live video in real time and to allow users to retrieve them. For this purpose, sophis...
Yasuo Ariki, Masahito Kumano, Kiyoshi Tsukada
CAISE
2006
Springer
15 years 1 months ago
A Tool for Semi-Automated Semantic Schema Mapping: Design and Implementation
Recently, schema mapping has found considerable interest in both research and practice. Determining matching components of database or XML schemas is needed in many applications, e...
Dimitris Manakanatas, Dimitris Plexousakis