Sciweavers

9245 search results - page 1667 / 1849
» Virtualization
Sort
View
135
Voted
IHI
2010
106views Healthcare» more  IHI 2010»
14 years 10 months ago
Identifying opportunities for inpatient-centric technology
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
Meredith M. Skeels, Desney S. Tan
142
Voted
JCAL
2010
152views more  JCAL 2010»
14 years 10 months ago
Micro-adaptivity: protecting immersion in didactically adaptive digital educational games
The idea of utilizing the rich potential of today's computer games for educational purposes excites educators, scientists and technicians. Despite the significant hype over di...
Michael D. Kickmeier-Rust, Dietrich Albert
JMLR
2010
103views more  JMLR 2010»
14 years 10 months ago
Learning Nonlinear Dynamic Models from Non-sequenced Data
Virtually all methods of learning dynamic systems from data start from the same basic assumption: the learning algorithm will be given a sequence of data generated from the dynami...
Tzu-Kuo Huang, Le Song, Jeff Schneider
JNSM
2010
110views more  JNSM 2010»
14 years 10 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
147
Voted
JOC
2010
92views more  JOC 2010»
14 years 10 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
« Prev « First page 1667 / 1849 Last » Next »