Sciweavers

2674 search results - page 85 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
119
Voted
CONCUR
2008
Springer
15 years 5 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
CHI
2004
ACM
16 years 3 months ago
Context-sensitive design and human-centered interactive systems
Context is a critical element in forming the performance of interactive systems. As the functional diversity and range of use context of the system increase, context sensitivity b...
Keiichi Sato, Ken Douros
ISORC
2007
IEEE
15 years 9 months ago
A Comparative Evaluation of EJB Implementation Methods
As E-businesses are becoming ubiquitous, enhancing the performance and scalability of ebusiness systems has become an increasingly important topic of investigation. As Vitruvius (...
Andreas Stylianou, Giovanna Ferrari, Paul D. Ezhil...
132
Voted
TPDS
1998
112views more  TPDS 1998»
15 years 3 months ago
Parallel Computation in Biological Sequence Analysis
—A massive volume of biological sequence data is available in over 36 different databases worldwide, including the sequence data generated by the Human Genome project. These data...
Tieng K. Yap, Ophir Frieder, Robert L. Martino
116
Voted
APCHI
2004
IEEE
15 years 7 months ago
Our Ubiquitous Computing Home Inside: A Practical Approach Emerging into House and Home
To make practical ubiquitous computing environment for everyday activities especially for house and home, the environment has to be proactively managed by the users at home themsel...
Soichiro Iga, Saiko Ohno