Sciweavers

26 search results - page 3 / 6
» aiccsa 2005
Sort
View
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
13 years 11 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
AICCSA
2005
IEEE
89views Hardware» more  AICCSA 2005»
13 years 11 months ago
ESPERANTO: a middleware platform to achieve interoperability in nomadic computing domains
The most challenging issues in Nomadic Computing environments arise from the combination of heterogeneity, dynamism, context-awareness, and mobility. Driven by these issues, this ...
Marcello Cinque, Domenico Cotroneo, Cristiano di F...
AICCSA
2005
IEEE
129views Hardware» more  AICCSA 2005»
13 years 7 months ago
Enhanced visual evaluation of feature extractors for image mining
Plus BROWSE SEARCH IEEE XPLORE GUIDE SUPPORT View TOC Enhanced visual evaluation of feature extractors for image mining Rodrigues, J.F., Jr. Traina, A.J.M. Traina, C., Jr. Comput. ...
José Fernando Rodrigues Jr., Agma J. M. Tra...
AICCSA
2005
IEEE
82views Hardware» more  AICCSA 2005»
13 years 7 months ago
Reverse engineering of framework design using a meta-patterns-based approach
Object-oriented frameworks are a powerful reuse technique but they are also very complex and difficult to design. Framework’s design aims at separating the invariant aspects acr...
Nuno Flores, Ademar Aguiar
AICCSA
2005
IEEE
103views Hardware» more  AICCSA 2005»
13 years 11 months ago
Consistent graph layout for weighted graphs
In this paper we present three algorithms that build graph layouts for undirected, weighted graphs. Our goal is to generate layouts that are consistent with the weights in the gra...
Dana Vrajitoru, Jason DeBoni