Sciweavers

1234 search results - page 155 / 247
» Privacy-preserving Virtual Machine
Sort
View
VR
2008
IEEE
120views Virtual Reality» more  VR 2008»
15 years 3 months ago
Force modeling for tooth preparation in a dental training system
Feedback force is very important for novices to simulate tooth preparation by using the haptic interaction system (dental training system) in a virtual environment. In the process ...
Guanyang Liu, Yuru Zhang, William T. Townsend
CASES
2006
ACM
15 years 9 months ago
Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems
A Java bytecode-to-C ahead-of-time compiler (AOTC) can improve the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into mac...
Dong-Heon Jung, Sung-Hwan Bae, Jaemok Lee, Soo-Moo...
DRM
2006
Springer
15 years 7 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
AI
2008
Springer
15 years 4 months ago
The well-designed young mathematician
This paper complements McCarthy's "The well designed child", in part by putting it in a broader context, the space of possible well designed progeny, and in part by...
Aaron Sloman
INTERNET
2007
105views more  INTERNET 2007»
15 years 3 months ago
Workflow Planning on a Grid
evel of abstraction, we can represent a workflow as a directed graph with operators (or tasks) at the vertices (see Figure 1). Each operator takes inputs from data sources or from ...
Craig W. Thompson, Wing Ning Li, Zhichun Xiao