The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this research is visualizing the motion of bones which we can only make diagnoses today by several values. Conventional methods have several problems. The main problem is that it is difficult for everyone to understand clearly by only these values. We use infrared cameras and Point Cluster Technique (PCT), and plot their data on the computer. We show the three dimensional graphics animation...
We have designed and implemented a scripting environment called "Kumoi" for managing collective VMs in a large-scale data center. Kumoi is unlike other scripting environments because it exploits strong typing with type inference and high-level description. Kumoi introduces several advancements, including treating virtual machines as first-class objects and decoupling the scripting model...
Previously developed longitudinal infant speech databases are limited in terms of recording period or number of utterances. To facilitate longitudinal research on the development of speech production, an infant speech database was developed by using five years of recordings containing a large number of daily life utterances of five Japanese infants and their parents. The resulting database contains...
In recent years, as the data processed by governmental or commercial organizations increases, cases involving information leak have risen. It is difficult to control information on many distributed end-point computers using conventional security mechanisms. Therefore, we have been proposed a novel secure VMM (Virtual Machine Monitor) architecture which is used as a foundation of security policy enforcement...
A new anomaly detection system for mobile handsets has been proposed. In this system, software behavior that deviates from a model representing normal behavior is considered to be an anomaly. It is generally impossible to cover software behavior exhaustively by the model, which could adversely affect accuracy. In order to resolve this problem, the proposed system assesses the anomalousness of behavior...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.