Sciweavers

5377 search results - page 1020 / 1076
» Programming Languages For Interactive Computing
Sort
View
COMPSAC
2010
IEEE
15 years 10 days ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
SMA
2008
ACM
150views Solid Modeling» more  SMA 2008»
15 years 2 months ago
Surface matching using consistent pants decomposition
Surface matching is fundamental to shape computing and various downstream applications. This paper develops a powerful pants decomposition framework for computing maps between sur...
Xin Li, Xianfeng Gu, Hong Qin
117
Voted
ACMSE
2006
ACM
15 years 4 months ago
Tic-Tac-LEGO: an investigation into coordinated robotic control
The Lego Mindstorms Robot Command eXplorer (RCX) is a popular robotics kit that provides an immediate "out-of-the-box" opportunity to explore software controlled robot i...
Ruben Vuittonet, Jeff Gray
BMCBI
2007
120views more  BMCBI 2007»
15 years 2 months ago
Recognition of interferon-inducible sites, promoters, and enhancers
Background: Computational analysis of gene regulatory regions is important for prediction of functions of many uncharacterized genes. With this in mind, search of the target genes...
Elena A. Ananko, Yury V. Kondrakhin, Tatyana I. Me...
ICALP
2009
Springer
16 years 2 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
« Prev « First page 1020 / 1076 Last » Next »