Sciweavers

9071 search results - page 1705 / 1815
» A co-design modeling approach for computer network systems
Sort
View
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 2 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
WM
2003
14 years 11 months ago
The differentia principle as a cornerstone of ontology
The Information Society relies more and more on the co-operation and collaboration of multidisciplinary people who need to communicate and share information. Communication and kno...
Christophe Spies
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 11 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
BMCBI
2010
126views more  BMCBI 2010»
14 years 7 months ago
PETALS: Proteomic Evaluation and Topological Analysis of a mutated Locus' Signaling
Background: Colon cancer is driven by mutations in a number of genes, the most notorious of which is Apc. Though much of Apc's signaling has been mechanistically identified o...
Gürkan Bebek, Vishal Patel, Mark R. Chance
TMC
2012
13 years 9 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
« Prev « First page 1705 / 1815 Last » Next »