Sciweavers

461 search results - page 54 / 93
» Developing security protocols by refinement
Sort
View
MM
2000
ACM
131views Multimedia» more  MM 2000»
14 years 6 days ago
A virtual media (Vmedia) JPEG 2000 interactive image browser
A Vmedia JPEG 2000 interactive image browser is developed. Two key technologies make our system unique: it is the first to implement the decoder ROI access functionality of JPEG 2...
Jin Li, Hong-Hui Sun
ESCIENCE
2006
IEEE
13 years 11 months ago
Toward Standards for Integration of Instruments into Grid Computing Environments
Instruments and sensors are the primary sources of data driving science and the development and refinement of theory. A critical component of eresearch yet to be clarified is the ...
Donald F. McMullen, Ian M. Atkinson, Kenneth Chiu,...
FM
2006
Springer
148views Formal Methods» more  FM 2006»
13 years 11 months ago
Automatic Translation from Circus to Java
Abstract. Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that autom...
Angela Freitas, Ana Cavalcanti
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ACSAC
2001
IEEE
13 years 11 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel