Sciweavers

12568 search results - page 2248 / 2514
» Selective user interaction
Sort
View
AOSD
2009
ACM
15 years 11 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
HIPEAC
2009
Springer
15 years 11 months ago
Mapping and Synchronizing Streaming Applications on Cell Processors
Developing streaming applications on heterogenous multi-processor architectures like the Cell is difficult. Currently, application developers need to know about hardware details t...
Maik Nijhuis, Herbert Bos, Henri E. Bal, Cé...
TACAS
2009
Springer
131views Algorithms» more  TACAS 2009»
15 years 11 months ago
Verifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing...
Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Ma...
COMPSAC
2009
IEEE
15 years 11 months ago
Real-Time Guarantees in Flexible Advance Reservations
—This paper deals with the problem of scheduling workflow applications with Quality of Service (QoS) constraints, comprising real-time and interactivity constraints, over a servi...
Kleopatra Konstanteli, Dimosthenis Kyriazis, Theod...
CRV
2009
IEEE
148views Robotics» more  CRV 2009»
15 years 11 months ago
A Novel Algorithm for Extraction of the Layers of the Cornea
Accurate corneal layer boundary extraction from optical coherence tomography can provide precise layer thickness measurements required in the analysis of corneal disease. This pap...
Justin A. Eichel, Akshaya Kumar Mishra, Paul W. Fi...
« Prev « First page 2248 / 2514 Last » Next »