Sciweavers

2261 search results - page 298 / 453
» Dynamic types for authentication
Sort
View
IJSYSC
2010
97views more  IJSYSC 2010»
13 years 7 months ago
A stability study on first-order neutral systems with three rationally independent time delays
— First order linear time invariant and time delayed dynamics of neutral type is taken into account with three rationally independent delays. There are two main contributions of ...
Rifat Sipahi, Nejat Olgaç, Dimitri Breda
PKDD
2010
Springer
152views Data Mining» more  PKDD 2010»
13 years 7 months ago
CET: A Tool for Creative Exploration of Graphs
We present a tool for interactive exploration of graphs that integrates advanced graph mining methods in an interactive visualization framework. The tool enables efficient explorat...
Stefan Haun, Andreas Nürnberger, Tobias K&oum...
ICUMT
2009
13 years 6 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
IJACTAICIT
2010
185views more  IJACTAICIT 2010»
13 years 6 months ago
Adaptive Bandwidth Allocation Scheme for Cognitive Radios
In recent past, cognitive radio has come out to as a promising solution to the spectrum scarcity problem. It tends to increase the spectrum utilization by making use of underutili...
Prabhjot Kaur, Moin Uddin, Arun Khosla
ACSC
2010
IEEE
13 years 4 months ago
Average distance as a predictor of synchronisability in networks of coupled oscillators
The importance of networks of coupled oscillators is widely recognized. Such networks occur in biological systems like the heart, in chemical systems, in computational problems, a...
Anthony H. Dekker