Sciweavers

10700 search results - page 2015 / 2140
» Generative Design Patterns
Sort
View
ERCIM
2007
91views more  ERCIM 2007»
15 years 2 months ago
Challenges in a Service-Oriented World
t of view of the service itself. It is an abstracted version of the original service. An operating guideline of a service represents the possible communication behaviours of partne...
Wolfgang Reisig, Karsten Wolf, Jan Bretschneider, ...
TCS
2008
15 years 2 months ago
A typed lambda calculus with intersection types
Intersection types are well-known to type theorists mainly for two reasons. Firstly, they type all and only the strongly normalizable lambda terms. Secondly, the intersection type...
Viviana Bono, Betti Venneri, Lorenzo Bettini
TISSEC
2008
235views more  TISSEC 2008»
15 years 2 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
BMCBI
2005
101views more  BMCBI 2005»
15 years 2 months ago
TmaDB: a repository for tissue microarray data
Background: Tissue microarray (TMA) technology has been developed to facilitate large, genome-scale molecular pathology studies. This technique provides a high-throughput method f...
Archana Sharma-Oates, Philip Quirke, David R. West...
132
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 2 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 2015 / 2140 Last » Next »