Sciweavers

6434 search results - page 1015 / 1287
» Model Transformations with Reference Models
Sort
View
JAC
2008
15 years 5 months ago
Rule 110: universality and catenations
Cellular automata are a simple model of parallel computation. Many people wonder about the computing power of such a model. Following an idea of S. Wolfram [16], M. Cook [3] has pr...
Gaétan Richard
IADIS
2004
15 years 5 months ago
Towards Understanding of Factors Influencing User Acceptance of Mobile Payment Systems
M-payments, which refer to payments over a mobile device, have not taken off as fast as predicted. Their slow adoption rates raise many questions about what drives consumer behavi...
Agnieszka Zmijewska, Elaine Lawrence, Robert Steel...
APVIS
2009
15 years 5 months ago
Toward effective insight management in visual analytics systems
Although significant progress has been made toward effective insight discovery in visual sense making approaches, there is a lack of effective and efficient approaches to manage t...
Yang Chen, Jing Yang, William Ribarsky
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2006
121views more  BMCBI 2006»
15 years 4 months ago
Evaluation of sequence alignments and oligonucleotide probes with respect to three-dimensional structure of ribosomal RNA using
Background: Availability of high-resolution RNA crystal structures for the 30S and 50S ribosomal subunits and the subsequent validation of comparative secondary structure models h...
Yadhu Kumar, Ralf Westram, Peter Kipfer, Harald Me...
« Prev « First page 1015 / 1287 Last » Next »