Sciweavers

851 search results - page 136 / 171
» Synthesis of Distributed Systems from Knowledge-Based Specif...
Sort
View
ACSAC
2004
IEEE
14 years 2 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
MEDINFO
2007
193views Healthcare» more  MEDINFO 2007»
14 years 10 days ago
Another HISA - The New Standard: Health Informatics - Service Architecture
In addition to the meaning as Health Informatics Society of Australia, HISA is the acronym used for the new European Standard: Health Informatics – Service Architecture. This EN...
Gunnar O. Klein, Pier Angelo Sottile, Frederik End...
ISCI
2002
132views more  ISCI 2002»
13 years 10 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
ICIP
2003
IEEE
15 years 15 days ago
Wavelet-based level set evolution for classification of textured images
We present a supervised classification model based on a variational approach. This model is specifically devoted to textured images. We want to get a partition of an image, compos...
Jean-François Aujol, Gilles Aubert, Laure B...
CN
2000
76views more  CN 2000»
13 years 10 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...