Sciweavers

1766 search results - page 298 / 354
» A Distributed Communication System for Integration with Logi...
Sort
View
140
Voted
CBMS
2002
IEEE
15 years 8 months ago
How to Add Content-based Image Retrieval Capability in a PACS
This paper presents a new Picture Archiving and Communication System (PACS), called cbPACS which has content-based image retrieval resources. The cbPACS answers similarity queries...
Josiane M. Bueno, Fabio Jun Takada Chino, Agma J. ...
143
Voted
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
15 years 10 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
CASES
2010
ACM
15 years 1 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
117
Voted
CASES
2004
ACM
15 years 9 months ago
High-level power analysis for on-chip networks
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...
Noel Eisley, Li-Shiuan Peh
150
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...