Sciweavers

198 search results - page 29 / 40
» Flexible Modeling of Emergency Scenarios using Reconfigurabl...
Sort
View
ACSAC
2009
IEEE
14 years 19 days ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
CARS
2004
13 years 10 months ago
Haptic interaction in VR-based paracentesis simulation for dexterity enhancement and assessment
In this paper we describe the development of an interactive virtual reality (VR) system that aims to realistically simulate specific paracentesis clinical procedures (particularly ...
Costas S. Tzafestas, Yiannis Koumpouros, Kostas Bi...
ACSAC
1999
IEEE
14 years 29 days ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
WWW
2008
ACM
14 years 9 months ago
Personalized web exploration with task models
Personalized Web search has emerged as one of the hottest topics for both the Web industry and academic researchers. However, the majority of studies on personalized search focuse...
Jae-wook Ahn, Peter Brusilovsky, Daqing He, Jonath...
SIGSOFT
2007
ACM
14 years 9 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...