Sciweavers

19320 search results - page 3685 / 3864
» On the complexity of computing determinants
Sort
View
137
Voted
CHI
2009
ACM
15 years 8 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
HAPTICS
2009
IEEE
15 years 8 months ago
Intravascular palpation and haptic feedback during angioplasty
Within the HapCath - haptic catheter - project an assistive system for interventional catheterizations has been developed. Conventional navigation during catheterization is done b...
Thorsten Meiss, Christoph Budelmann, Thorsten Alex...
151
Voted
FAST
2008
15 years 7 months ago
Improving I/O Performance of Applications through Compiler-Directed Code Restructuring
Ever-increasing complexity of large-scale applications and continuous increases in sizes of the data they process make the problem of maximizing performance of such applications a...
Mahmut T. Kandemir, Seung Woo Son, Mustafa Karak&o...
MOBISYS
2008
ACM
15 years 7 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
154
Voted
NSDI
2008
15 years 7 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
« Prev « First page 3685 / 3864 Last » Next »