Sciweavers

1120 search results - page 145 / 224
» Securely sharing neuroimagery
Sort
View
CLEIEJ
2006
147views more  CLEIEJ 2006»
15 years 20 days ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
112
Voted
COMCOM
2006
148views more  COMCOM 2006»
15 years 20 days ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
77
Voted
DKE
2006
79views more  DKE 2006»
15 years 19 days ago
The view-based approach to dynamic inter-organizational workflow cooperation
This paper presents a novel approach to inter-organizational workflow cooperation. Our goal is to provide support for organizations which are involved in a shared but not pre-mode...
Issam Chebbi, Schahram Dustdar, Samir Tata
JCS
2008
69views more  JCS 2008»
15 years 18 days ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
80
Voted
JNW
2008
104views more  JNW 2008»
15 years 18 days ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...