Sciweavers

1114 search results - page 121 / 223
» Better Construction with Factories
Sort
View
106
Voted
SASO
2007
IEEE
15 years 7 months ago
Improving ICE Service Selection in a P2P System using the Gradient Topology
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Jim Dowling, Jan Sacha, Seif Haridi
100
Voted
SIES
2007
IEEE
15 years 7 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
108
Voted
SMC
2007
IEEE
15 years 7 months ago
An information-theoretic detector based scheme for registration of speckled medical images
— Several studies dealt with medical ultrasound registration. Their similarity metrics relied on pixel-to-pixel intensity comparisons. Hence, they are not well suited to the case...
Zhe Wang, Gregory G. Slabaugh, Gozde B. Unal, Meng...
VL
2007
IEEE
132views Visual Languages» more  VL 2007»
15 years 7 months ago
A Study on Applying Roles of Variables in Introductory Programming
Expert programmers possess programming knowledge, which is language independent and abstract. Still, programming is mostly taught only via constructs of a programming language and...
Pauli Byckling, Jorma Sajaniemi
121
Voted
ESORICS
2007
Springer
15 years 7 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...