Sciweavers

2013 search results - page 332 / 403
» Analysis and Design Techniques for Service-Oriented Developm...
Sort
View
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
JAMIA
2010
116views more  JAMIA 2010»
13 years 2 months ago
Extracting Rx information from clinical narrative
Objective The authors used the i2b2 Medication Extraction Challenge to evaluate their entity extraction methods, contribute to the generation of a publicly available collection of...
James G. Mork, Olivier Bodenreider, Dina Demner-Fu...
SIGIR
2010
ACM
13 years 11 months ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...
VR
2000
IEEE
174views Virtual Reality» more  VR 2000»
14 years 4 days ago
Optimization-Based Virtual Surface Contact Manipulation at Force Control Rates
Previous interactive works have used springs, heuristics, and dynamics for surface placement applications. We present an analytical technique for kilohertz rate manipulation of CA...
Donald D. Nelson, Elaine Cohen
SIGDOC
2009
ACM
14 years 2 months ago
Facilita: reading assistance for low-literacy readers
Texts are the media content primarily available on Web sites and applications. However, this heavy use of texts creates an accessibility barrier to those who cannot read fluently...
Willian Massami Watanabe, Arnaldo Candido Junior, ...