Sciweavers

15792 search results - page 3112 / 3159
» Computational Abstraction Steps
Sort
View
FASE
2008
Springer
13 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
BILDMED
2007
107views Algorithms» more  BILDMED 2007»
13 years 10 months ago
Whole Body MRI Intensity Standardization
Abstract. A major problem of segmentation of magnetic resonance images is that intensities are not standardized like in computed tomography. This article deals with the correction ...
Florian Jäger, László G. Ny&uac...
EON
2008
13 years 10 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
IM
2007
13 years 10 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
SERVICES
2008
246views more  SERVICES 2008»
13 years 10 months ago
BioFlow: A Web-Based Declarative Workflow Language for Life Sciences
Scientific workflows in Life Sciences are usually complex, and use many online databases, analysis tools, publication repositories and customized computation intensive desktop sof...
Hasan M. Jamil, Bilal El-Hajj-Diab
« Prev « First page 3112 / 3159 Last » Next »