Sciweavers

859 search results - page 58 / 172
» Behaviour Analysis of Distributed Systems Using the Tracta A...
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
VOSS
2004
Springer
135views Mathematics» more  VOSS 2004»
14 years 3 months ago
Analysing Randomized Distributed Algorithms
Abstract. Randomization is of paramount importance in practical applications and randomized algorithms are used widely, for example in co-ordinating distributed computer networks, ...
Gethin Norman
CCGRID
2007
IEEE
14 years 2 months ago
A Computer-Aided Diagnostic System using a Global Data Grid Repository for the Evaluation of Ultrasound Carotid Images
A computer-aided diagnostic (CAD) method of calculating lumen and wall thickness of carotid vessels is presented. The CAD is able to measure the geometry of the lumen and plaque s...
Marco Antonio Gutierrez, Silvia Helena Gelas Lage,...
RIDE
1999
IEEE
14 years 2 months ago
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise
One of the problems faced by an organisation participating in a virtual enterprise is how to specify internal and external aspects of the organisation in terms of the organisation...
Emil Lupu, Zoran Milosevic, Morris Sloman
ICPADS
2002
IEEE
14 years 3 months ago
Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System
Video-on-demand (VoD) systems have traditionally been built on the client-server architecture, where a video server stores, retrieves, and transmits video data to video clients fo...
Jack Y. B. Lee, Raymond W. T. Leung