Sciweavers

14850 search results - page 2970 / 2970
» The Security of
Sort
View
CBMS
2004
IEEE
13 years 9 months ago
Online Medical Teaching Case Database
Page >> Table of Contents >> Abstract 17th IEEE Symposium on Computer-Based Medical Systems (CBMS'04) p. 420 Online Medical Teaching Case Database Susan Kansagra, ...
Susan Kansagra, Chris Chang, Saleem Hussain, Grego...
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
13 years 6 months ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao
NETWORK
2008
150views more  NETWORK 2008»
13 years 5 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
SCFBM
2008
131views more  SCFBM 2008»
13 years 4 months ago
FASH: A web application for nucleotides sequence search
: FASH (Fourier Alignment Sequence Heuristics) is a web application, based on the Fast Fourier Transform, for finding remote homologs within a long nucleic acid sequence. Given a ...
Isana Veksler-Lublinsky, Danny Barash, Chai Avisar...
NETGAMES
2006
ACM
13 years 11 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
« Prev « First page 2970 / 2970 Last » Next »