Sciweavers

4270 search results - page 631 / 854
» Implementation of interactive poster
Sort
View
CCS
2005
ACM
15 years 10 months ago
On the cost-ineffectiveness of redundancy in commercial P2P computing
We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated...
Matthew Yurkewych, Brian Neil Levine, Arnold L. Ro...
DNA
2005
Springer
102views Bioinformatics» more  DNA 2005»
15 years 10 months ago
Chain Reaction Systems Based on Loop Dissociation of DNA
In the field of DNA computing, more and more efforts are made for constructing molecular machines made of DNA that work in vitro or in vivo. States of some of those machines are...
Keiichiro Takahashi, Satsuki Yaegashi, Atsushi Kam...
EDO
2005
Springer
15 years 10 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
EGC
2005
Springer
15 years 10 months ago
eNANOS Grid Resource Broker
Grid computing has been presented as a way to share geographically and organizationally distributed resources and to perform successfully distributed computation. For achieve this ...
Ivan Rodero, Julita Corbalán, Rosa M. Badia...
EGOV
2005
Springer
15 years 10 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller