Sciweavers

1234 search results - page 210 / 247
» Privacy-preserving Virtual Machine
Sort
View
DAGSTUHL
2010
15 years 1 months ago
Pre-operative Planning and Intra-operative Guidance for Shoulder Replacement Surgery
Shoulder joint replacement, or arthroplasty, is indicated in cases where arthritis or trauma has resulted in severe joint damage that in turn causes increased pain and decreased f...
Charl P. Botha, Peter R. Krekel, Edward R. Valstar...
CIDR
2007
156views Algorithms» more  CIDR 2007»
15 years 1 months ago
SwissQM: Next Generation Data Processing in Sensor Networks
Sensor networks are becoming an important part of the IT landscape. Existing systems, however, are limited in two fundamental ways: lack of data independence, and poor integration...
René Müller, Gustavo Alonso, Donald Ko...
LREC
2010
155views Education» more  LREC 2010»
15 years 1 months ago
Automatic Acquisition of Chinese Novel Noun Compounds
Automatic acquisition of novel compounds is notoriously difficult because most novel compounds have relatively low frequency in a corpus. The current study proposes a new method t...
Meng Wang, Chu-Ren Huang, Shiwen Yu, Weiwei Sun
ISCAPDCS
2008
15 years 1 months ago
LinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, ...
John M. Calandrino, Dan P. Baumberger, Tong Li, Je...
ICWS
2007
IEEE
15 years 1 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...