Sciweavers

409 search results - page 77 / 82
» Accessing Information and Services on the DAML-Enabled Web
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 6 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
IPPS
2000
IEEE
15 years 4 months ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad
BMCBI
2007
124views more  BMCBI 2007»
14 years 11 months ago
Protein structural similarity search by Ramachandran codes
Background: Protein structural data has increased exponentially, such that fast and accurate tools are necessary to access structure similarity search. To improve the search speed...
Wei-Cheng Lo, Po-Jung Huang, Chih-Hung Chang, Ping...
SOCA
2007
IEEE
15 years 6 months ago
A Service-oriented Architecture for Business Intelligence
Business intelligence is a business management term used to describe applications and technologies which are used to gather, provide access to and analyze data and information abo...
Liya Wu, Gilad Barash, Claudio Bartolini
ISCIS
2003
Springer
15 years 5 months ago
Virtual Interval Caching Scheme for Interactive Multimedia Streaming Workload
Abstract. We carefully believe that server workload for interactive multimedia service exhibits different characteristics from legacy application, e.g. ftp server, web server, ASP...
Kyoungwoon Cho, Yeonseung Ryu, Youjip Won, Kern Ko...