Sciweavers

6907 search results - page 938 / 1382
» Securing distributed adaptation
Sort
View
107
Voted
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 9 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
108
Voted
ACSC
2005
IEEE
15 years 9 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska
147
Voted
AINA
2005
IEEE
15 years 9 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
144
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
115
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...