Sciweavers

4762 search results - page 832 / 953
» About the use of protein models
Sort
View
HOTOS
2003
IEEE
15 years 6 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
IEEEPACT
2003
IEEE
15 years 6 months ago
Biomedical Computing and Visualization
Computers have changed the way we live, work, and even recreate. Now, they are transforming how we think about and treat human disease. In particular, advanced techniques in biome...
Chris Johnson
CIA
2003
Springer
15 years 6 months ago
A Peer-to-Peer Approach to Resource Discovery in Multi-agent Systems
A multi-agent system is a network of software agents that cooperate to solve problems. In open multi-agent systems, the agents that need resources provided by other agents are not ...
Vassilios V. Dimakopoulos, Evaggelia Pitoura
TRUST
2010
Springer
15 years 6 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ACSAC
2002
IEEE
15 years 6 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall