Sciweavers

247 search results - page 49 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
BMCBI
2006
242views more  BMCBI 2006»
13 years 5 months ago
Predicting residue-wise contact orders in proteins by support vector regression
Background: The residue-wise contact order (RWCO) describes the sequence separations between the residues of interest and its contacting residues in a protein sequence. It is a ne...
Jiangning Song, Kevin Burrage
HPCA
2009
IEEE
14 years 5 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
SACMAT
2009
ACM
13 years 12 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 5 months ago
Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study
—Established in 2005, YouTube has become the most successful Internet site providing a new generation of short video sharing service. Today, YouTube alone comprises approximately...
Xu Cheng, Cameron Dale, Jiangchuan Liu
IFIP
2004
Springer
13 years 10 months ago
New-HOPLA: A Higher-order Process Language with Name Generation
Abstract This paper introduces new-HOPLA, a concise but powerful language for higherorder nondeterministic processes with name generation. Its origins as a metalanguage for domain ...
Glynn Winskel, Francesco Zappa Nardelli