Sciweavers

2927 search results - page 146 / 586
» Secure Distributed Human Computation
Sort
View
CAD
2010
Springer
13 years 9 months ago
Pattern computation for compression garment by a physical/geometric approach
This paper addresses the problem of computing planar patterns for compression garments. In the garment industry, the compression garment has been more and more widely used to reta...
Charlie C. L. Wang, Kai Tang
POLICY
2009
Springer
14 years 4 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
BMCBI
2007
103views more  BMCBI 2007»
13 years 9 months ago
Systems biology approach for mapping the response of human urothelial cells to infection by Enterococcus faecalis
Background: To better understand the response of urinary epithelial (urothelial) cells to Enterococcus faecalis, a uropathogen that exhibits resistance to multiple antibiotics, a ...
Mikhail G. Dozmorov, Kimberly D. Kyker, Ricardo Sa...
ACMSE
2006
ACM
14 years 3 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
IPPS
2007
IEEE
14 years 4 months ago
Middleware and Performance Issues for Computational Finance Applications on Blue Gene/L
We discuss real-world case studies involving the implementation of a web services middleware tier for the IBM Blue Gene/L supercomputer to support financial business applications...
Thomas Phan, Ramesh Natarajan, Satoki Mitsumori, H...