Sciweavers

347 search results - page 25 / 70
» CVE Technology Development Based on Real World Application a...
Sort
View
BMCBI
2005
142views more  BMCBI 2005»
13 years 7 months ago
High performance workflow implementation for protein surface characterization using grid technology
Background: This study concerns the development of a high performance workflow that, using grid technology, correlates different kinds of Bioinformatics data, starting from the ba...
Ivan Merelli, Giulia Morra, Daniele D'Agostino, An...
ISICT
2004
13 years 9 months ago
Extending desktop applications to the web
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
Arno Puder
LISA
2007
13 years 10 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
CHI
2000
ACM
13 years 12 months ago
HandSCAPE: a vectorizing tape measure for on-site measuring applications
We introduce HandSCAPE, an orientation-aware digital tape measure, as an input device for digitizing field measurements, and visualizing the volume of the resulting vectors with c...
Jay Lee, Victor Su, Sandia Ren, Hiroshi Ishii
ISMAR
2003
IEEE
14 years 27 days ago
Real-Time Localisation and Mapping with Wearable Active Vision
We present a general method for real-time, visiononly single-camera simultaneous localisation and mapping (SLAM) — an algorithm which is applicable to the localisation of any ca...
Andrew J. Davison, Walterio W. Mayol-Cuevas, David...