Sciweavers

202 search results - page 40 / 41
» Network coding on line networks with broadcast
Sort
View
BMCBI
2011
13 years 10 days ago
Implementation of Force Distribution Analysis for Molecular Dynamics simulations
Background: The way mechanical stress is distributed inside and propagated by proteins and other biopolymers largely defines their function. Yet, determining the network of intera...
Wolfram Stacklies, Christian Seifert, Frauke Graet...
INFOCOM
2011
IEEE
12 years 8 months ago
Novasky: Cinematic-quality VoD in a P2P storage cloud
—In this paper, we present Novasky, a real-world Video-on-Demand (VoD) system capable of delivering cinematicquality video streams to end users. The foundation of the Novasky des...
Fangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao ...
ICS
2004
Tsinghua U.
13 years 10 months ago
Evaluating support for global address space languages on the Cray X1
The Cray X1 was recently introduced as the first in a new line of parallel systems to combine high-bandwidth vector processing with an MPP system architecture. Alongside capabili...
Christian Bell, Wei-Yu Chen, Dan Bonachea, Katheri...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
13 years 10 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
SACMAT
2010
ACM
13 years 10 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam