Sciweavers

2468 search results - page 444 / 494
» A New Approach to Pseudoword Generation
Sort
View
JHSN
2006
95views more  JHSN 2006»
15 years 1 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JIIS
2006
119views more  JIIS 2006»
15 years 1 months ago
Answering constraint-based mining queries on itemsets using previous materialized results
Abstract In recent years, researchers have begun to study inductive databases, a new generation of databases for leveraging decision support applications. In this context, the user...
Roberto Esposito, Rosa Meo, Marco Botta
ENTCS
2007
129views more  ENTCS 2007»
15 years 1 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
JVCA
2006
206views more  JVCA 2006»
15 years 1 months ago
Realistic human hand deformation
d Abstract) Jieun Lee, Seung-Hyun Yoon, and Myunng-Soo Kim Seoul National University, KOREA We present a new approach to realistic hand modeling and deformation with real-time per...
Jieun Lee, Seung-Hyun Yoon, Myung-Soo Kim
NAR
2008
119views more  NAR 2008»
15 years 1 months ago
TreeFam: 2008 Update
TreeFam (http://www.treefam.org) was developed to provide curated phylogenetic trees for all animal gene families, as well as orthologue and paralogue assignments. Release 4.0 of ...
Jue Ruan, Heng Li, Zhongzhong Chen, Avril Coghlan,...