Sciweavers

1739 search results - page 305 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
TDSC
2011
14 years 6 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
ICIP
2008
IEEE
16 years 1 months ago
Receiver driven layered multicast with layer-aware forward error correction
A wide range of different capabilities and connection qualities typically characterizes receivers of mobile television services. Receiver driven layered multicast (RDLM) offers an...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand
ISBI
2002
IEEE
16 years 15 days ago
Features of the NIH atlas small animal PET scanner and its use with a coaxial small animal volume CT scanner
ATLAS (Advanced Technology Laboratory Animal Scanner), a small animal PET scanner designed to image animals the size of rats and mice, is about to enter service on the NIH campus ...
Jürgen Seidel, Juan J. Vaquero, Javier Pascau...
WWW
2004
ACM
16 years 14 days ago
Semantic web applications to e-science in silico experiments
This paper explains our research and implementations of manual, automatic and deep annotations of provenance logs for e-Science in silico experiments. Compared to annotating gener...
Jun Zhao, Carole A. Goble, Robert Stevens
MHCI
2009
Springer
15 years 6 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi