Sciweavers

380 search results - page 73 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
79
Voted
HAPTICS
2009
IEEE
15 years 4 months ago
Quantifying perception of nonlinear elastic tissue models using multidimensional scaling
Simplified soft tissue models used in surgical simulations cannot perfectly reproduce all material behaviors. In particular, many tissues exhibit the Poynting effect, which resul...
Sarthak Misra, Philipp Fürnstahl, K. T. Rames...
HPDC
2010
IEEE
14 years 10 months ago
Early observations on the performance of Windows Azure
A significant open issue in cloud computing is performance. Few, if any, cloud providers or technologies offer quantitative performance guarantees. Regardless of the potential adv...
Zach Hill, Jie Li, Ming Mao, Arkaitz Ruiz-Alvarez,...
INFOCOM
2010
IEEE
14 years 8 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
JSS
2006
127views more  JSS 2006»
14 years 9 months ago
An approach to feature location in distributed systems
This paper describes an approach to the feature location problem for distributed systems, that is, to the problem of locating which code components are important in providing a pa...
Dennis Edwards, Sharon Simmons, Norman Wilde
JUCS
2006
225views more  JUCS 2006»
14 years 9 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke