Sciweavers

734 search results - page 57 / 147
» Computer Virus Propagation Models
Sort
View
PERCOM
2008
ACM
15 years 9 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
AUSAI
2007
Springer
15 years 4 months ago
Tomographic Reconstruction of Images from Noisy Projections - A Preliminary Study
Abstract. Although Computed Tomography (CT) is a mature discipline, the development of techniques that will further reduce radiation dose are still essential. This paper makes step...
A. P. Dalgleish, David L. Dowe, Imants D. Svalbe
MICCAI
2010
Springer
14 years 8 months ago
Fast Ultrasound Image Simulation Using the Westervelt Equation
Abstract. The simulation of ultrasound wave propagation is of high interest in fields as ultrasound system development and therapeutic ultrasound. From a computational point of vi...
Athanasios Karamalis, Wolfgang Wein, Nassir Navab
DAGSTUHL
2007
14 years 11 months ago
Programming self developing blob machines for spatial computing.
: This is a position paper introducing blob computing: A Blob is a generic primitive used to structure a uniform computing substrate into an easier-to-program parallel virtual mach...
Frédéric Gruau, Christine Eisenbeis
ER
1998
Springer
127views Database» more  ER 1998»
15 years 2 months ago
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication
1 Rumor is an optimistically replicated le system designed for use in mobile computers. Rumor uses a peer model that allows opportunistic update propagation among any sites replica...
Richard G. Guy, Peter L. Reiher, David Ratner, Mic...