Sciweavers

1926 search results - page 148 / 386
» From P to MP Systems
Sort
View
IMC
2006
ACM
15 years 4 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
FUZZIEEE
2007
IEEE
15 years 2 months ago
A System for Querying with Qualitative Distances in Networks
A central role of Geographic Information Systems (GIS) is to allow the identification and visualisation of relevant spatial features from typically large volumes of data. This requ...
Carl P. L. Schultz, Hans W. Guesgen, Robert Amor
66
Voted
SAC
2008
ACM
14 years 9 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
MICCAI
2005
Springer
15 years 11 months ago
Physiological System Identification with the Kalman Filter in Diffuse Optical Tomography
Abstract. Diffuse optical tomography (DOT) is a noninvasive imaging technology that is sensitive to local concentration changes in oxyand deoxyhemoglobin. When applied to functiona...
Solomon Gilbert Diamond, Theodore J. Huppert, Vill...
PAAPP
2006
44views more  PAAPP 2006»
14 years 10 months ago
Revisiting communication code generation algorithms for message-passing systems
In this paper, we investigate algorithms for generating communication code to run on distributedmemory systems. We modify algorithms from previously published work and prove that ...
Clayton S. Ferner