Sciweavers

2513 search results - page 479 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
ICCCN
2007
IEEE
14 years 4 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li
DAWAK
2007
Springer
14 years 4 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
ECOOP
2007
Springer
14 years 4 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
ISBRA
2007
Springer
14 years 4 months ago
Wavelet Image Interpolation (WII): A Wavelet-Based Approach to Enhancement of Digital Mammography Images
Abstract. Cancer detection using mammography focuses on characteristics of tiny microcalcifications, including the number, size, and spatial arrangement of microcalcification clu...
Gordana Derado, F. DuBois Bowman, Rajan Patel, Mar...