Sciweavers

6047 search results - page 915 / 1210
» Modeling with Extend
Sort
View
CN
1999
108views more  CN 1999»
15 years 3 months ago
Integrating Temporal Media and Open Hypermedia on the World Wide Web
CT The World Wide Web has since its beginning provided linking to and from text documents encoded in HTML. The Web has evolved and most Web browsers now support a rich set of media...
Niels Olof Bouvin, René Schade
TOPLAS
2010
93views more  TOPLAS 2010»
15 years 2 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
ICIP
2009
IEEE
15 years 1 months ago
Blind deblurring of foreground-background images
This paper presents a method for deblurring an image consisting of two layers (a foreground layer and a background layer) which have suffered different, unknown blurs. This is a s...
Mariana S. C. Almeida, Luis B. Almeida
112
Voted
IEEESCC
2009
IEEE
15 years 1 months ago
Reconfigurable SCA Applications with the FraSCAti Platform
The Service Component Architecture (SCA) is a technology agnostic standard for developing and deploying distributed service-oriented applications. However, SCA does not define sta...
Lionel Seinturier, Philippe Merle, Damien Fournier...
139
Voted

Publication
145views
15 years 16 hour ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...