Sciweavers

2250 search results - page 76 / 450
» Authorizing applications in singularity
Sort
View
87
Voted
IADIS
2004
15 years 6 months ago
Deployment of ICT application in rural India - our experience
The usability of software in rural environment is difficult for various reasons. Hence, the digital-divide remains between rural and urban population. The local language support, ...
Sree Kumar R., Neelanarayanan Venkataraman, Balaji...
WSC
1997
15 years 5 months ago
Application of Simulation Modeling to Emergency Population Evacuation
A simulation model was developed to predict with a certain degree of probability the optimal escape routs from the coastal areas of the Rio Grand Valley. Along with that, the mode...
Kambiz Farahmand
DM
2008
90views more  DM 2008»
15 years 4 months ago
On sums of binomial coefficients and their applications
In this paper we study recurrences concerning the combinatorial sum n r m = kr (mod m) n k and the alternate sum kr (mod m)(-1)(k-r)/m n k , where m > 0, n 0 and r are integers....
Zhi-Wei Sun
120
Voted
JNCA
2006
86views more  JNCA 2006»
15 years 4 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
136
Voted
NA
2008
297views more  NA 2008»
15 years 4 months ago
Generalized fast marching method: applications to image segmentation
In this paper, we propose a segmentation method based on the Generalized Fast Marching Method (GFMM) developed by Carlini et al.([6]). The classical Fast Marching Method (FMM) is a...
Nicolas Forcadel, Carole Le Guyader, Christian Gou...