Sciweavers

4163 search results - page 746 / 833
» Enhancing surgical systems
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 11 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
ECLIPSE
2005
ACM
13 years 9 months ago
Coping with an open bug repository
Most open source software development projects include an open bug repository—one to which users of the software can gain full access—that is used to report and track problems...
John Anvik, Lyndon Hiew, Gail C. Murphy
DIMEA
2008
138views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Motion2Sound
Motion2Sound is a program that translates motion properties into sound ones. This is done by using a motion detection system(Open Cv) and one can have as an input a live web-cam o...
Aggelos Bousbouras, Antanas Kazilunas
DIMVA
2008
13 years 9 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...