Sciweavers

175 search results - page 20 / 35
» Links in Hypermedia: The Requirement for Context
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
WDAG
2005
Springer
102views Algorithms» more  WDAG 2005»
15 years 3 months ago
Papillon: Greedy Routing in Rings
We study greedy routing over n nodes placed in a ring, with the distance between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such ...
Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku
COMPLIFE
2006
Springer
15 years 1 months ago
Software Supported Modelling in Pharmacokinetics
A powerful new software concept to physiologically based pharmacokinetic (PBPK) modelling of drug disposition is presented. It links the inherent modular understanding in pharmacol...
Regina Telgmann, Max von Kleist, Wilhelm Huisinga
CN
2002
85views more  CN 2002»
14 years 9 months ago
Analysis of delay and delay jitter of voice traffic in the Internet
In the future, voice communication is expected to migrate from the public switched telephone network to the Internet. Because of the particular characteristics (low volume and bur...
Mansour J. Karam, Fouad A. Tobagi
ISSA
2008
14 years 11 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius