Sciweavers

3106 search results - page 567 / 622
» Both Generic Design and Different Forms of Designing
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
HASKELL
2008
ACM
14 years 11 months ago
Lightweight monadic regions
We present Haskell libraries that statically ensure the safe use of resources such as file handles. We statically prevent accessing an already closed handle or forgetting to clos...
Oleg Kiselyov, Chung-chieh Shan
SIGCOMM
2010
ACM
14 years 10 months ago
Detecting the performance impact of upgrades in large operational networks
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of up...
Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman S...
AROBOTS
2010
144views more  AROBOTS 2010»
14 years 10 months ago
EL-E: an assistive mobile manipulator that autonomously fetches objects from flat surfaces
Abstract Assistive mobile robots that autonomously manipulate objects within everyday settings have the potential to improve the lives of the elderly, injured, and disabled. Within...
Advait Jain, Charles C. Kemp
BMCBI
2010
86views more  BMCBI 2010»
14 years 10 months ago
ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite
Background: Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents...
Evgeniy V. Petrotchenko, Christoph H. Borchers