Sciweavers

6106 search results - page 1052 / 1222
» Modes for Software Architectures
Sort
View
102
Voted
DAC
2005
ACM
16 years 4 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
138
Voted
ISBI
2006
IEEE
16 years 4 months ago
Development of a research interface for image guided intervention: initial application to epilepsy neurosurgery
This paper describes the development and application of methods to integrate research image analysis methods and software with a commercial image guided surgery navigation system ...
Xenophon Papademetris, Kenneth P. Vives, Marcello ...
112
Voted
WWW
2008
ACM
16 years 4 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
119
Voted
WWW
2004
ACM
16 years 4 months ago
HPG: a tool for presentation generation in WIS
Web Information Systems (WIS) support the process of retrieving information from sources on the Web and of presenting them as a hypermedia presentation. Most WIS design ogies focu...
Bas Rutten, Peter Barna, Flavius Frasincar, Geert-...
WWW
2004
ACM
16 years 4 months ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong
« Prev « First page 1052 / 1222 Last » Next »