Sciweavers

734 search results - page 57 / 147
» Computer Virus Propagation Models
Sort
View
106
Voted
PERCOM
2008
ACM
16 years 2 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
96
Voted
AUSAI
2007
Springer
15 years 8 months ago
Tomographic Reconstruction of Images from Noisy Projections - A Preliminary Study
Abstract. Although Computed Tomography (CT) is a mature discipline, the development of techniques that will further reduce radiation dose are still essential. This paper makes step...
A. P. Dalgleish, David L. Dowe, Imants D. Svalbe
153
Voted
MICCAI
2010
Springer
15 years 1 months ago
Fast Ultrasound Image Simulation Using the Westervelt Equation
Abstract. The simulation of ultrasound wave propagation is of high interest in fields as ultrasound system development and therapeutic ultrasound. From a computational point of vi...
Athanasios Karamalis, Wolfgang Wein, Nassir Navab
120
Voted
DAGSTUHL
2007
15 years 4 months ago
Programming self developing blob machines for spatial computing.
: This is a position paper introducing blob computing: A Blob is a generic primitive used to structure a uniform computing substrate into an easier-to-program parallel virtual mach...
Frédéric Gruau, Christine Eisenbeis
113
Voted
ER
1998
Springer
127views Database» more  ER 1998»
15 years 6 months ago
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication
1 Rumor is an optimistically replicated le system designed for use in mobile computers. Rumor uses a peer model that allows opportunistic update propagation among any sites replica...
Richard G. Guy, Peter L. Reiher, David Ratner, Mic...