Sciweavers

7109 search results - page 1342 / 1422
» Process Algebra with Combinators
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 9 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
EGC
2005
Springer
15 years 9 months ago
Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach
Abstract. Grid technology is widely emerging as a solution for wide-spread applicability of computerized analysis and processing procedures in biomedical sciences. In this paper we...
Sebastián Ordas, Hans C. van Assen, Loic Bo...
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
IUI
2004
ACM
15 years 9 months ago
What role can adaptive support play in an adaptable system?
As computer applications become larger with every new version, there is a growing need to provide some way for users to manage the interface complexity. There are three different ...
Andrea Bunt, Cristina Conati, Joanna McGrenere
MOBICOM
2004
ACM
15 years 9 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
« Prev « First page 1342 / 1422 Last » Next »