Sciweavers

24529 search results - page 354 / 4906
» Computing on Authenticated Data
Sort
View
ICALT
2006
IEEE
15 years 10 months ago
A Model for Interoperability in Computer Supported Collaborative Learning
Computer Supported Collaborative Learning activities involve combination of complex software tools that often need to interoperate in a wider context of learning. This paper propo...
Georgios Kahrimanis, Andreas Papasalouros, Nikolao...
EUROPAR
2004
Springer
15 years 9 months ago
A Proxy Server-Network for Real-Time Computer Games
Abstract. Computer games played over the Internet have recently become an important class of distributed applications. In this paper we present a novel proxy server-network topolog...
Jens Müller 0004, Stefan Fischer, Sergei Gorl...
BIB
2008
109views more  BIB 2008»
15 years 4 months ago
Computational intelligence approaches for pattern discovery in biological systems
Biology, chemistry and medicine are faced by tremendous challenges caused by an overwhelming amount of data and the need for rapid interpretation. Computational intelligence (CI) ...
Gary B. Fogel
CNSM
2010
15 years 2 months ago
Rule-based SLA management for revenue maximisation in Cloud Computing Markets
This paper introduces several Business Rules for maximising the revenue of Providers in Cloud Computing Markets. These rules apply in both negotiation and execution time, and enfor...
Mario Macías, Josep Oriol Fitó, Jord...
FSTTCS
2007
Springer
15 years 10 months ago
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
Judicaël Courant, Cristian Ene, Yassine Lakhn...