Sciweavers

1923 search results - page 200 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
DEBS
2007
ACM
14 years 12 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
87
Voted
ICWS
2009
IEEE
15 years 7 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
ICIP
2000
IEEE
15 years 2 months ago
Wavelet-Based Image Denoising Using Hidden Markov Models
Wavelet-domain hidden Markov models (HMMs) have been recently proposed and applied to image processing, e.g., image denoising. In this paper, we develop a new HMM, called local co...
Guoliang Fan, Xiang-Gen Xia
AAAI
2000
14 years 11 months ago
Disjunctive Temporal Reasoning in Partially Ordered Models of Time
Certain problems in connection with, for example, cooperating agents and distributed systems require reasoning about time which is measured on incomparable or unsynchronized time ...
Mathias Broxvall, Peter Jonsson
EUROCRYPT
2003
Springer
15 years 3 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu