Sciweavers

2912 search results - page 442 / 583
» Overlay Networks - Implementation by Specification
Sort
View
IPCCC
2006
IEEE
15 years 10 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
WMTE
2006
IEEE
15 years 10 months ago
Innovative and Sustainable Mobile Learning in Africa
Mobile learning, based on the use of mobile and wireless devices to support, enhance and deliver learning, is rapidly gaining ground as a component of blended and technology enhan...
John Traxler, Jenny Leach
ICDCSW
2005
IEEE
15 years 10 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ISM
2005
IEEE
91views Multimedia» more  ISM 2005»
15 years 10 months ago
Research on the Discrimination of Pornographic and Bikini Images
Our research extends the general technologies detecting pornographic images to prevent the benign images whose content is approximate with the pornographic ones from being screene...
Yushi Wang, Weiqiang Wang, Wen Gao
WILF
2005
Springer
194views Fuzzy Logic» more  WILF 2005»
15 years 10 months ago
Learning Bayesian Classifiers from Gene-Expression MicroArray Data
Computing methods that allow the efficient and accurate processing of experimentally gathered data play a crucial role in biological research. The aim of this paper is to present a...
Andrea Bosin, Nicoletta Dessì, Diego Libera...