Sciweavers

350 search results - page 24 / 70
» Improving application security with data flow assertions
Sort
View
DAGSTUHL
2010
13 years 9 months ago
Visual Simulation of Flow
We have adopted a numerical method from computational fluid dynamics, the Lattice Boltzmann Method (LBM), for real-time simulation and visualization of flow and amorphous phenomen...
Arie E. Kaufman, Ye Zhao
FORTE
2004
13 years 9 months ago
PEPA Nets in Practice: Modelling a Decentralised Peer-to-Peer Emergency Medical Application
Abstract. We apply the PEPA nets modelling language to modelling a peer-topeer medical informatics application, the FieldCare PDA-based medical records system developed by SINTEF T...
Stephen Gilmore, Valentin Haenel, Jane Hillston, L...
ICC
2009
IEEE
246views Communications» more  ICC 2009»
14 years 2 months ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan
FGCN
2007
IEEE
109views Communications» more  FGCN 2007»
14 years 2 months ago
Flow Balancing Hardware for Parallel TCP Streams on Long Fat Pipe Network
Parallel TCP streams are used for data transfer between clusters in today's high performance applications. When parallel TCP streams are used on LFN, part of streams fail to ...
Yutaka Sugawara, Mary Inaba, Kei Hiraki
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...