Sciweavers

208 search results - page 19 / 42
» What Helps Where - And Why
Sort
View
SC
2004
ACM
14 years 3 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
ICRA
2003
IEEE
168views Robotics» more  ICRA 2003»
14 years 3 months ago
Structure and pose from single images of symmetric objects with applications to robot navigation
In this paper, we provide a principled and unified explanation how knowledge in global 3-D structural invariants, typically captured by a group action on a symmetric structure, ca...
Allen Y. Yang, Wei Hong, Yi Ma
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ER
2006
Springer
96views Database» more  ER 2006»
14 years 1 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
CMSB
2009
Springer
14 years 1 months ago
Control Strategies for the Regulation of the Eukaryotic Heat Shock Response
Abstract. Elevated temperatures cause proteins in living cells to misfold. They start forming larger and larger aggregates that can eventually lead to the cell's death. The he...
Elena Czeizler, Eugen Czeizler, Ralph-Johan Back, ...