Sciweavers

1430 search results - page 236 / 286
» Layered Depth Images
Sort
View
BTW
2003
Springer
118views Database» more  BTW 2003»
14 years 2 months ago
Information System Architectures: From Art to Science
: The presentation claims that architectural design plays a crucial role in system development as a first step in a process that turns a requirements specification into a working s...
Peter C. Lockemann
ISBMS
2010
Springer
14 years 2 months ago
A Theoretical Model for RF Ablation of Kidney Tissue and Its Experimental Validation
Radio-frequency (RF) ablation is a minimal invasive thermal therapy, currently considered as an alternative to surgery to eradicate small solid kidney tumors. Our aim is to underst...
Mihaela Pop, Sean R. H. Davidson, Mark Gertner, Mi...
AES
2007
Springer
75views Cryptology» more  AES 2007»
13 years 9 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
CACM
1998
110views more  CACM 1998»
13 years 8 months ago
Viewing WISs as Database Applications
abstraction for modeling these problems is to view the Web as a collection of (usually small and heterogeneous) databases, and to view programs that extract and process Web data au...
Gustavo O. Arocena, Alberto O. Mendelzon
USS
2010
13 years 6 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...