Sciweavers

24095 search results - page 4765 / 4819
» Researchers and Development - Young Researches
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 9 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
CORR
2010
Springer
115views Education» more  CORR 2010»
14 years 9 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
CORR
2010
Springer
157views Education» more  CORR 2010»
14 years 9 months ago
Using Semantic Wikis for Structured Argument in Medical Domain
This research applies ideas from argumentation theory in the context of semantic wikis, aiming to provide support for structured-large scale argumentation between human agents. The...
Adrian Groza, Radu Balaj
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
Provenance and evidence in UniProtKB
Abstract. The primary mission of UniProt is to support biological research by maintaining a stable, comprehensive, fully classified, richly and accurately annotated protein sequenc...
Jerven Bolleman, Alain Gateau, Sebastien Gehant, N...
112
Voted
CORR
2010
Springer
137views Education» more  CORR 2010»
14 years 9 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
« Prev « First page 4765 / 4819 Last » Next »