Sciweavers

2050 search results - page 322 / 410
» constraints 2010
Sort
View
KBSE
2010
IEEE
13 years 7 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
LATIN
2010
Springer
13 years 7 months ago
Packet Routing on the Grid
The packet routing problem, i.e., the problem to send a given set of unit-size packets through a network on time, belongs to one of the most fundamental routing problems with impor...
Britta Peis, Martin Skutella, Andreas Wiese
LICS
2010
IEEE
13 years 7 months ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...
MDM
2010
Springer
213views Communications» more  MDM 2010»
13 years 7 months ago
Towards Adaptive Sensor Data Management for Distributed Fire Evacuation Infrastructure
— We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks sh...
Andrii Cherniak, Vladimir Zadorozhny
MICCAI
2010
Springer
13 years 7 months ago
3D Knowledge-Based Segmentation Using Pose-Invariant Higher-Order Graphs
Segmentation is a fundamental problem in medical image analysis. The use of prior knowledge is often considered to address the ill-posedness of the process. Such a process consists...
Chaohui Wang, Olivier Teboul, Fabrice Michel, Salm...