Sciweavers

4944 search results - page 960 / 989
» From XML to Relational Models
Sort
View
170
Voted
IPCAI
2010
15 years 29 days ago
First Animal Cadaver Study for Interlocking of Intramedullary Nails under Camera Augmented Mobile C-arm
The Camera Augmented Mobile C-arm (CamC) system that augments a regular mobile C-arm by a video camera provides an overlay image of X-ray and video. This technology is expected to ...
Lejing Wang, Jürgen Landes, Simon Weidert, To...
158
Voted
CSMR
2010
IEEE
14 years 10 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
183
Voted
MEDES
2010
ACM
14 years 10 months ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa
167
Voted
JCDL
2011
ACM
221views Education» more  JCDL 2011»
14 years 6 months ago
Integrating implicit structure visualization with authoring promotes ideation
We need to harness the growing wealth of information in digital libraries to support intellectual work involving creative and exploratory processes. Prior research on hypertext au...
Andrew M. Webb, Andruid Kerne
161
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters