Sciweavers

13306 search results - page 2582 / 2662
» Theoretical Computer Science
Sort
View
MICCAI
2003
Springer
16 years 23 days ago
Real-Time Synthesis of Bleeding for Virtual Hysteroscopy
In this paper we present a method for simulating bleeding in a virtual reality hysteroscopic simulator for surgical training. The simulated bleeding is required to be visually app...
János Zátonyi, Rupert Paget, G&aacut...
MICCAI
2005
Springer
16 years 23 days ago
Exploiting Temporal Information in Functional Magnetic Resonance Imaging Brain Data
Functional Magnetic Resonance Imaging(fMRI) has enabled scientists to look into the active human brain, leading to a flood of new data, thus encouraging the development of new data...
Lei Zhang 0002, Dimitris Samaras, Dardo Tomasi, Ne...
ICSE
2008
IEEE-ACM
16 years 21 days ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
ICSE
2008
IEEE-ACM
16 years 21 days ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
SIGSOFT
2005
ACM
16 years 18 days ago
KenyaEclipse: learning to program in eclipse
A fundamental part of a Computer Science degree is learning to program. Rather than starting students on a full commercial language, we favour using a dedicated "teaching lan...
Robert Chatley, Thomas Timbul
« Prev « First page 2582 / 2662 Last » Next »