Sciweavers

1363 search results - page 56 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
93
Voted
ISBI
2008
IEEE
15 years 11 months ago
Distributed online anomaly detection in high-content screening
This paper presents an automated, online approach to anomaly detection in high-content screening assays for pharmaceutical research. Online detection of anomalies is attractive be...
Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei...
ICSE
2004
IEEE-ACM
15 years 11 months ago
Managing Commitments and Risks: Challenges in Distributed Agile Development
Software development is always a challenging undertaking and it requires high commitments from individuals who participate in it. Software development often involves new technolog...
Jan Rydén, Jyrki Kontio, Magnus Höglun...
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 5 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...
OTM
2005
Springer
15 years 4 months ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan
EUROPKI
2004
Springer
15 years 4 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...