Sciweavers

2250 search results - page 76 / 450
» Authorizing applications in singularity
Sort
View
IADIS
2004
14 years 11 months ago
Deployment of ICT application in rural India - our experience
The usability of software in rural environment is difficult for various reasons. Hence, the digital-divide remains between rural and urban population. The local language support, ...
Sree Kumar R., Neelanarayanan Venkataraman, Balaji...
WSC
1997
14 years 11 months ago
Application of Simulation Modeling to Emergency Population Evacuation
A simulation model was developed to predict with a certain degree of probability the optimal escape routs from the coastal areas of the Rio Grand Valley. Along with that, the mode...
Kambiz Farahmand
DM
2008
90views more  DM 2008»
14 years 10 months ago
On sums of binomial coefficients and their applications
In this paper we study recurrences concerning the combinatorial sum n r m = kr (mod m) n k and the alternate sum kr (mod m)(-1)(k-r)/m n k , where m > 0, n 0 and r are integers....
Zhi-Wei Sun
JNCA
2006
86views more  JNCA 2006»
14 years 9 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
NA
2008
297views more  NA 2008»
14 years 9 months ago
Generalized fast marching method: applications to image segmentation
In this paper, we propose a segmentation method based on the Generalized Fast Marching Method (GFMM) developed by Carlini et al.([6]). The classical Fast Marching Method (FMM) is a...
Nicolas Forcadel, Carole Le Guyader, Christian Gou...