Sciweavers

2714 search results - page 387 / 543
» Under the table interaction
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
BIBE
2006
IEEE
112views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
Finding Correlations in Functionally Equivalent Proteins by Integrating Automated and Visual Data Exploration
The analysis of alignments of functionally equivalent proteins can reveal regularities such as correlated positions or residue patterns which are important to ensure a specific f...
Daniel A. Keim, Daniela Oelke, Royal Truman, Klaus...
CCGRID
2006
IEEE
15 years 10 months ago
SSB : A Grid-based Infrastructure for HLA Systems
Service Oriented EXtensible Modeling and Simulation Supporting Environment Architecture (SO-XMSSEA) is presented based on XMSF thinking and the new technology development of web s...
Xu Li-juan, Peng Xiao-yuan
EDOC
2006
IEEE
15 years 10 months ago
Model-Driven Dashboards for Business Performance Reporting
Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an approach...
Pawan Chowdhary, Themis Palpanas, Florian Pinel, S...
HAPTICS
2006
IEEE
15 years 10 months ago
Pseudo-admittance Bilateral Telemanipulation with Guidance Virtual Fixtures
We present a novel bilateral telemanipulation control system called Pseudo-admittance, which is designed to mimic admittance control on systems where the master is an impedance-ty...
Jake J. Abbott, Allison M. Okamura