Sciweavers

2135 search results - page 412 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
ISI
2008
Springer
13 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
WWW
2007
ACM
14 years 10 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
QSHINE
2009
IEEE
14 years 4 months ago
Integration of OMF-Based Testbeds in a Global-Scale Networking Facility
PlanetLab is a global scale platform for experimentation of new networking applications in a real environment. It consists of several nodes, offered by academic institutions or co...
Giovanni Di Stasi, Stefano Avallone, Roberto Canon...
ICSE
2007
IEEE-ACM
14 years 4 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
CVRMED
1997
Springer
14 years 2 months ago
Simulating arthroscopic knee surgery using volumetric object representations, real-time volume rendering and haptic feedback
A system for simulating arthroscopic knee surgery that is based on volumetric object models derived from 3D Magnetic Resonance Imaging is presented. Feedback is provided to the us...
Sarah F. Frisken Gibson, Joe Samosky, Andrew B. Mo...