Sciweavers

5630 search results - page 120 / 1126
» Computability in Specification
Sort
View
PDCAT
2005
Springer
15 years 9 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
138
Voted
SERVICES
2008
71views more  SERVICES 2008»
15 years 5 months ago
Using Problems to Learn Service-Oriented Computing
Service-oriented computing and the ensuing science of services represent significant challenges to academia. As we come to grips with its many implications, we are slowly beginnin...
Sandeep Purao, Vijay K. Vaishnavi, John W. Bagby, ...
IVC
2006
101views more  IVC 2006»
15 years 4 months ago
Numerical error analysis in Zernike moments computation
An exact analysis of the numerical errors being generated during the computation of the Zernike moments, by using the well-known `q-recursive' method, is attempted in this pa...
George A. Papakostas, Yiannis S. Boutalis, Constan...
ACG
2009
Springer
15 years 10 months ago
Data Assurance in Opaque Computations
The chess endgame is increasingly being seen through the lens of, and therefore effectively defined by, a data ‘model’ of itself. It is vital that such models are clearly faith...
Joe Hurd, Guy Haworth
BROADNETS
2007
IEEE
15 years 10 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy