Sciweavers

4184 search results - page 110 / 837
» Names of Our Lives
Sort
View
CSE
2009
IEEE
15 years 8 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
EUC
2007
Springer
15 years 7 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson
103
Voted
ICFEM
2005
Springer
15 years 7 months ago
Visualizing and Simulating Semantic Web Services Ontologies
The development of Web Services has transformed the World Wide Web into a more application-aware information portal. The various standards ensure that Web Services are interpretabl...
Jun Sun 0001, Yuan-Fang Li, Hai H. Wang, Jing Sun
HASE
1998
IEEE
15 years 6 months ago
Verification in Concurrent Programming with Petri Nets Structural Techniques
This paper deals with verification of flow control in concurrent programs. We use Ada language model as reference. After translation of Ada programs into Petri nets (named Ada net...
Kamel Barkaoui, Jean-François Pradat-Peyre
EMSOFT
2008
Springer
15 years 3 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...