Sciweavers

3751 search results - page 192 / 751
» Events in security protocols
Sort
View
MIDDLEWARE
2005
Springer
15 years 9 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
BMCBI
2007
121views more  BMCBI 2007»
15 years 4 months ago
A procedure for identifying homologous alternative splicing events
Background: The study of the functional role of alternative splice isoforms of a gene is a very active area of research in biology. The difficulty of the experimental approach (in...
David Talavera, Adam Hospital, Modesto Orozco, Xav...
137
Voted
ICALP
2010
Springer
15 years 6 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
141
Voted
WORDS
2003
IEEE
15 years 9 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
115
Voted
WSC
2008
15 years 6 months ago
A methodology for input data management in discrete event simulation projects
Discrete event simulation (DES) projects rely heavily on high input data quality. Therefore, the input data management process is very important and, thus, consumes an extensive a...
Anders Skoogh, Björn Johansson