Sciweavers

1116 search results - page 39 / 224
» Secure Mediation: Requirements and Design
Sort
View
BMCBI
2004
151views more  BMCBI 2004»
14 years 9 months ago
Design, implementation and evaluation of a practical pseudoknot folding algorithm based on thermodynamics
Background: The general problem of RNA secondary structure prediction under the widely used thermodynamic model is known to be NP-complete when the structures considered include a...
Jens Reeder, Robert Giegerich
IMCS
2007
78views more  IMCS 2007»
14 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
POPL
2005
ACM
15 years 10 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
WWW
2006
ACM
15 years 10 months ago
On a service-oriented approach for an engineering knowledge desktop
Increasingly, manufacturing companies are shifting their focus from selling products to providing services. As a result, when designing new products, engineers must increasingly c...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 2 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt