Sciweavers

4075 search results - page 99 / 815
» Modeling Distributed Algorithm Using B
Sort
View
JSS
2006
169views more  JSS 2006»
13 years 9 months ago
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on se...
Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matj...
EUROPLOP
2006
13 years 10 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
BMCBI
2007
147views more  BMCBI 2007»
13 years 9 months ago
Statistical analysis and significance testing of serial analysis of gene expression data using a Poisson mixture model
Background: Serial analysis of gene expression (SAGE) is used to obtain quantitative snapshots of the transcriptome. These profiles are count-based and are assumed to follow a Bin...
Scott D. Zuyderduyn
SAC
2008
ACM
13 years 8 months ago
A biologically inspired generation of virtual characters
A number of techniques for generating geometric models of human head and body are in use nowadays. Models of human characters are useful in computer games, virtual reality, and ma...
Roberto C. Cavalcante Vieira, Creto Augusto Vidal,...
LCTRTS
2001
Springer
14 years 1 months ago
Power-Aware Design Synthesis Techniques for Distributed Real-Time Systems
This paper presents an end-to-end synthesis technique for lowpower distributed real-time system design. This technique synthesizes supply voltages of resources to optimize system-...
Dong-In Kang, Stephen P. Crago, Jinwoo Suh