Sciweavers

7527 search results - page 1493 / 1506
» Design and implementation of the KioskNet system
Sort
View
GD
2008
Springer
14 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BMCBI
2010
109views more  BMCBI 2010»
14 years 9 months ago
Prediction of the binding affinities of peptides to class II MHC using a regularized thermodynamic model
Background: The binding of peptide fragments of extracellular peptides to class II MHC is a crucial event in the adaptive immune response. Each MHC allotype generally binds a dist...
Andrew J. Bordner, Hans D. Mittelmann
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
IJVR
2006
116views more  IJVR 2006»
14 years 9 months ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
JTAER
2006
100views more  JTAER 2006»
14 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
« Prev « First page 1493 / 1506 Last » Next »