Sciweavers

2061 search results - page 62 / 413
» Authorization for Metacomputing Applications
Sort
View
JNCA
2006
86views more  JNCA 2006»
15 years 3 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
NA
2008
297views more  NA 2008»
15 years 3 months ago
Generalized fast marching method: applications to image segmentation
In this paper, we propose a segmentation method based on the Generalized Fast Marching Method (GFMM) developed by Carlini et al.([6]). The classical Fast Marching Method (FMM) is a...
Nicolas Forcadel, Carole Le Guyader, Christian Gou...
PUC
2007
135views more  PUC 2007»
15 years 3 months ago
Towards a Multimodal Interaction Space: categorisation and applications
Based on many experiences of developing interactive systems by the authors, a framework for the description and analysis of interaction has been developed. The dimensions of this m...
Bert Bongers, Gerrit C. van der Veer
MCS
2010
Springer
15 years 2 months ago
MinT - Architecture and applications of the (t, m, s)-net and OOA database
Many different constructions for (t, m, s)-nets and (t, s)-sequences are known today. Propagation rules as well as connections to other mathematical objects make it difficult to ...
Rudolf Schürer, Wolfgang Ch. Schmid
158
Voted
IMCSIT
2010
15 years 1 months ago
Modelling, Optimization and Execution of Workflow Applications with Data Distribution, Service Selection and Budget Constraints
Abstract--The paper proposes a model which allows integration of services published by independent providers into scientific or business workflows. Optimization algorithms are prop...
Pawel Czarnul