Sciweavers

620 search results - page 105 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
TCSB
2008
14 years 9 months ago
Clustering Time-Series Gene Expression Data with Unequal Time Intervals
Clustering gene expression data given in terms of time-series is a challenging problem that imposes its own particular constraints, namely exchanging two or more time points is not...
Luis Rueda, Ataul Bari, Alioune Ngom
JSA
2007
162views more  JSA 2007»
14 years 9 months ago
Exploration of distributed shared memory architectures for NoC-based multiprocessors
Multiprocessor system-on-chip (MP-SoC) platforms represent an emerging trend for embedded multimedia applications. To enable MP-SoC platforms, scalable communication-centric inter...
Matteo Monchiero, Gianluca Palermo, Cristina Silva...
JWSR
2007
119views more  JWSR 2007»
14 years 9 months ago
Ontology Driven Data Mediation in Web Services
: With the rising popularity of Web services, both academia and industry have invested considerably in Web service description standards, discovery, and composition techniques. The...
Meenakshi Nagarajan, Kunal Verma, Amit P. Sheth, J...
WIAS
2008
98views more  WIAS 2008»
14 years 9 months ago
Delegations guided by trust and autonomy
This paper explores delegation decisions predicated on models of trust and autonomy among agents. In socially rich environments, trust and autonomy of artificial agents are key att...
Henry Hexmoor, Shahram Rahimi, Rachil Chandran
COMCOM
2000
105views more  COMCOM 2000»
14 years 9 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz