Sciweavers

9162 search results - page 1719 / 1833
» System and User Data Complexity
Sort
View
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
CIKM
2009
Springer
15 years 1 months ago
Effective, design-independent XML keyword search
Keyword search techniques that take advantage of XML structure make it very easy for ordinary users to query XML databases, but current approaches to processing these queries rely...
Arash Termehchy, Marianne Winslett
WSC
2007
15 years 8 days ago
Enabling smooth and scalable dynamic 3d visualization of discrete-event construction simulations in outdoor augmented reality
Visualization is a powerful method for verifying, validating, and communicating the results of a simulated model. Lack of visual understanding about a simulated model is one of th...
Amir H. Behzadan, Vineet R. Kamat
ARC
2008
Springer
126views Hardware» more  ARC 2008»
14 years 12 months ago
DNA Physical Mapping on a Reconfigurable Platform
Reconfigurable architectures enable the hardware function to be implemented by the user and, due to its characteristics, have been used in many areas, including Bioinformatics. One...
Adriano Idalgo, Nahri Moreano
BIRD
2008
Springer
123views Bioinformatics» more  BIRD 2008»
14 years 12 months ago
E-BioFlow: Different Perspectives on Scientific Workflows
We introduce a new type of workflow design system called e-BioFlow and illustrate it by means of a simple sequence alignment workflow. E-BioFlow, intended to model advanced scienti...
Ingo H. C. Wassink, Han Rauwerda, Paul E. van der ...
« Prev « First page 1719 / 1833 Last » Next »