Sciweavers

3056 search results - page 498 / 612
» Open Implementation Analysis and Design
Sort
View
NSDI
2008
15 years 7 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
BIRD
2008
Springer
15 years 6 months ago
Efficient Seeding Techniques for Protein Similarity Search
Abstract. We apply the concept of subset seeds proposed in [1] to similarity search in protein sequences. The main question studied is the design of efficient seed alphabets to con...
Mikhail A. Roytberg, Anna Gambin, Laurent No&eacut...
ECOWS
2007
Springer
15 years 6 months ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
WSC
1997
15 years 6 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly
AI
2005
Springer
15 years 4 months ago
Semiotic schemas: A framework for grounding language in action and perception
A theoretical framework for grounding language is introduced that provides a computational path from sensing and motor action to words and speech acts. The approach combines conce...
Deb Roy