Sciweavers

5267 search results - page 910 / 1054
» Methods for Knowledge Based Controlling of Distributed Syste...
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 12 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
158
Voted
CBMS
2002
IEEE
15 years 10 months ago
How to Add Content-based Image Retrieval Capability in a PACS
This paper presents a new Picture Archiving and Communication System (PACS), called cbPACS which has content-based image retrieval resources. The cbPACS answers similarity queries...
Josiane M. Bueno, Fabio Jun Takada Chino, Agma J. ...
WDAG
2010
Springer
230views Algorithms» more  WDAG 2010»
15 years 3 months ago
Implementing Fault-Tolerant Services Using State Machines: Beyond Replication
Abstract—This paper describes a method to implement faulttolerant services in distributed systems based on the idea of fused state machines. The theory of fused state machines us...
Vijay K. Garg
BMCBI
2008
108views more  BMCBI 2008»
15 years 5 months ago
New application of intelligent agents in sporadic amyotrophic lateral sclerosis identifies unexpected specific genetic backgroun
Background: Few genetic factors predisposing to the sporadic form of amyotrophic lateral sclerosis (ALS) have been identified, but the pathology itself seems to be a true multifac...
Silvana Penco, Massimo Buscema, Maria Cristina Pat...
156
Voted
ECAI
2004
Springer
15 years 10 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...