Sciweavers

2677 search results - page 503 / 536
» Locally Served Network Computers
Sort
View
ECIS
2003
15 years 1 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
WCE
2007
15 years 28 days ago
A Patch-by-Patch Shape Matching Procedure for Rigid Body Docking
Abstract—Docking simulates molecular interactions. Protein - protein docking, owing to the sizes of molecules, is a very challenging problem. As the number of degrees of freedom ...
Vipin K. Tripathi
BMCBI
2010
97views more  BMCBI 2010»
14 years 12 months ago
Incorporating significant amino acid pairs to identify O-linked glycosylation sites on transmembrane proteins and non-transmembr
Background: While occurring enzymatically in biological systems, O-linked glycosylation affects protein folding, localization and trafficking, protein solubility, antigenicity, bi...
Shu-An Chen, Tzong-Yi Lee, Yu-Yen Ou
COMCOM
2008
91views more  COMCOM 2008»
14 years 12 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CVIU
2006
317views more  CVIU 2006»
14 years 11 months ago
A general method for human activity recognition in video
In this paper we develop a system for human behaviour recognition in video sequences. Human behaviour is modelled as a stochastic sequence of actions. Actions are described by a f...
Neil Robertson, Ian D. Reid