Sciweavers

117 search results - page 24 / 24
» Data Provenance: A Categorization of Existing Approaches
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 6 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
IJCAT
2010
87views more  IJCAT 2010»
13 years 4 months ago
Image-based measurement of alveoli volume expansion in an animal model of a diseased lung
Currently, there does not exist reliable MV treatment or protocols in critical care to treat acute respiratory diseases, and thus no proven way to optimise care to minimise the mor...
Christopher E. Hann, Darren Hewett, J. Geoffrey Ch...