Sciweavers

7694 search results - page 1321 / 1539
» An Implementation of an Applicative File System
Sort
View
OSDI
1996
ACM
15 years 5 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
MOBICOM
2010
ACM
15 years 4 months ago
SMS-based web search for low-end mobile devices
Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile de...
Jay Chen, Lakshminarayanan Subramanian, Eric A. Br...
BMCBI
2008
185views more  BMCBI 2008»
15 years 4 months ago
Mining clinical relationships from patient narratives
Background: The Clinical E-Science Framework (CLEF) project has built a system to extract clinically significant information from the textual component of medical records in order...
Angus Roberts, Robert J. Gaizauskas, Mark Hepple, ...
COMCOM
2006
105views more  COMCOM 2006»
15 years 4 months ago
An observation-based approach towards self-managing web servers
As more business applications have become web enabled, the web server architecture has evolved to provide performance isolation, service differentiation, and QoS guarantees. Vario...
Abhishek Chandra, Prashant Pradhan, Renu Tewari, S...
PAMI
2006
229views more  PAMI 2006»
15 years 4 months ago
A Coherent Computational Approach to Model Bottom-Up Visual Attention
Visual attention is a mechanism which filters out redundant visual information and detects the most relevant parts of our visual field. Automatic determination of the most visually...
Olivier Le Meur, Patrick Le Callet, Dominique Barb...
« Prev « First page 1321 / 1539 Last » Next »