Sciweavers

2061 search results - page 62 / 413
» Authorization for Metacomputing Applications
Sort
View
89
Voted
JNCA
2006
86views more  JNCA 2006»
15 years 14 days ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
NA
2008
297views more  NA 2008»
15 years 14 days ago
Generalized fast marching method: applications to image segmentation
In this paper, we propose a segmentation method based on the Generalized Fast Marching Method (GFMM) developed by Carlini et al.([6]). The classical Fast Marching Method (FMM) is a...
Nicolas Forcadel, Carole Le Guyader, Christian Gou...
PUC
2007
135views more  PUC 2007»
15 years 14 hour ago
Towards a Multimodal Interaction Space: categorisation and applications
Based on many experiences of developing interactive systems by the authors, a framework for the description and analysis of interaction has been developed. The dimensions of this m...
Bert Bongers, Gerrit C. van der Veer
89
Voted
MCS
2010
Springer
14 years 11 months ago
MinT - Architecture and applications of the (t, m, s)-net and OOA database
Many different constructions for (t, m, s)-nets and (t, s)-sequences are known today. Propagation rules as well as connections to other mathematical objects make it difficult to ...
Rudolf Schürer, Wolfgang Ch. Schmid
IMCSIT
2010
14 years 10 months ago
Modelling, Optimization and Execution of Workflow Applications with Data Distribution, Service Selection and Budget Constraints
Abstract--The paper proposes a model which allows integration of services published by independent providers into scientific or business workflows. Optimization algorithms are prop...
Pawel Czarnul