Sciweavers

740 search results - page 61 / 148
» Experiments on Supporting Interactive Proof Using Resolution
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 5 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
BMCBI
2005
122views more  BMCBI 2005»
15 years 1 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
ICDCS
1991
IEEE
15 years 5 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste
RPTEL
2006
96views more  RPTEL 2006»
15 years 1 months ago
Supporting Self-Directed Learners and Learning Communities with Sociotechnical Environments
Making learning part of life is an essential challenge for inventing the future of our societies. Lifelong learning is a necessity rather than a possibility or a luxury to be cons...
Gerhard Fischer, Masanori Sugimoto
CCGRID
2004
IEEE
15 years 5 months ago
Effective use of reputation in peer-to-peer environments
Peer-to-peer environments have become popular as a framework for exchange of services. In these environments, certain peers may fail to provide their services. Reputation can be a...
Thanasis G. Papaioannou, George D. Stamoulis