Sciweavers

4762 search results - page 814 / 953
» About the use of protein models
Sort
View
OTM
2007
Springer
15 years 7 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 7 months ago
Game Theoretical Analysis of Cooperative Sourcing Scenarios
As an emerging trend in outsourcing, cooperative sourcing is the merging of similar processes of several firms when, for example, several banks merge their payments processing and...
Daniel Beimborn, Hermann-Josef Lamberti, Tim Weitz...
INFOCOM
2006
IEEE
15 years 7 months ago
Optimal Scheduling Algorithms for Input-Queued Switches
— The input-queued switch architecture is widely used in Internet routers, due to its ability to run at very high line speeds. A central problem in designing an input-queued swit...
Devavrat Shah, Damon Wischik
ASWEC
2005
IEEE
15 years 7 months ago
A UML Approach to the Generation of Test Sequences for Java-Based Concurrent Systems
Starting with a UML specification that captures the underlying functionality of some given Java-based concurrent system, we describe a systematic way to construct, from this speci...
Soon-Kyeong Kim, Luke Wildman, Roger Duke
CRV
2005
IEEE
198views Robotics» more  CRV 2005»
15 years 7 months ago
Analysis of Player Actions in Selected Hockey Game Situations
We present a proof of concept system to represent and reason about hockey play. The system takes as input player motion trajectory data tracked from game video and supported by kn...
Fahong Li, Robert J. Woodham