Sciweavers

4564 search results - page 791 / 913
» Data Integration Using ID-Logic
Sort
View
HIPEAC
2005
Springer
14 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SCALESPACE
2005
Springer
14 years 3 months ago
Image Deblurring in the Presence of Salt-and-Pepper Noise
The problem of image deblurring in the presence of salt and pepper noise is considered. Standard image deconvolution algorithms, that are designed for Gaussian noise, do not perfor...
Leah Bar, Nir A. Sochen, Nahum Kiryati
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
14 years 3 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler
SENSYS
2004
ACM
14 years 3 months ago
A sensor network application construction kit (SNACK)
We propose a new configuration language, component and service library, and compiler that make it easier to develop efficient sensor network applications. Our goal is the constr...
Ben Greenstein, Eddie Kohler, Deborah Estrin
SENSYS
2004
ACM
14 years 3 months ago
Sensor network-based countersniper system
An ad-hoc wireless sensor network-based system is presented that detects and accurately locates shooters even in urban environments. The system consists of a large number of cheap...
Gyula Simon, Miklós Maróti, Á...