Sciweavers

1893 search results - page 103 / 379
» Computational composites
Sort
View
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Whole Genome Phylogeny Based on Clustered Signature String Composition
Peptide compositions constructed out of whole sets of protein sequences can be used as species signatures for phylogenetic analysis. To account for point mutations, an amino acid ...
Xiaomeng Wu, Guohui Lin, Xiu-Feng Wan, Dong Xu
139
Voted
LCN
2005
IEEE
15 years 10 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...
143
Voted
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
CIA
2003
Springer
15 years 10 months ago
Adaptive Agent-Based Service Composition for Wireless Terminals
Software agents are one of the building blocks of ambient intelligence and pervasive computing. Adaptation to changes in the execution context is necessary in order to provide cont...
Sasu Tarkoma, Mikko Laukkanen
147
Voted
ALP
1994
Springer
15 years 9 months ago
Compositional Analysis for Equational Horn Programs
Abstract. We introduce a compositional characterization of the operational semantics of equational Horn programs. Then we show that this semantics and the standard operational sema...
María Alpuente, Moreno Falaschi, Germ&aacut...