Sciweavers

904 search results - page 138 / 181
» Architecture in an agile world
Sort
View
COMSWARE
2006
IEEE
14 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
ESCIENCE
2006
IEEE
14 years 3 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
IEEEARES
2006
IEEE
14 years 3 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
MM
2006
ACM
153views Multimedia» more  MM 2006»
14 years 3 months ago
Buzz: telling compelling stories
This paper describes a digital theater installation called Buzz. Buzz consists of virtual actors who express the collective voice generated by weblogs (blogs). These actors find ...
Sara Owsley, Kristian J. Hammond, David A. Shamma,...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu