Sciweavers

34181 search results - page 6449 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
EUROPAR
2006
Springer
15 years 8 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 8 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
GECCO
2006
Springer
172views Optimization» more  GECCO 2006»
15 years 8 months ago
Multi-objective optimisation of the protein-ligand docking problem in drug discovery
The pharmaceutical industry is facing an ever-increasing demand to discover novel drugs that are more effective and safer than existing ones. The industry faces huge problem in im...
A. Oduguwa, A. Tiwari, S. Fiorentino, R. Roy
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 8 months ago
Genetic algorithms for positioning and utilizing sensors in synthetically generated landscapes
Positioning multiple sensors for acquisition of a a given environment is one of the fundamental research areas in various fields, such as military scouting, computer vision and ro...
Haluk Topcuoglu, Murat Ermis
AFRIGRAPH
2001
ACM
15 years 8 months ago
Realistic visualisation of the Pompeii frescoes
Three dimensional computer reconstruction provides us with a means of visualising past environments, allowing us a glimpse of the past that might otherwise be difficult to appreci...
Kate Devlin, Alan Chalmers
« Prev « First page 6449 / 6837 Last » Next »