Sciweavers

7329 search results - page 1236 / 1466
» Software Architectural Transformation
Sort
View
148
Voted
SPRINGSIM
2010
15 years 3 months ago
Advanced IDE for modeling and simulation of discrete event systems
: Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been deve...
Matías Bonaventura, Gabriel A. Wainer, Rodr...
TIFS
2010
128views more  TIFS 2010»
15 years 3 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
145
Voted
WIAS
2010
102views more  WIAS 2010»
15 years 3 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
CODES
2010
IEEE
15 years 2 months ago
A greedy buffer allocation algorithm for power-aware communication in body sensor networks
Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. In spite of their potentials for many application domains,...
Hassan Ghasemzadeh, Roozbeh Jafari
COMPSAC
2010
IEEE
15 years 2 months ago
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The streambased services util...
Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil ...
« Prev « First page 1236 / 1466 Last » Next »