Sciweavers

11752 search results - page 2280 / 2351
» Those
Sort
View
JCS
2010
104views more  JCS 2010»
14 years 8 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JOCN
2010
85views more  JOCN 2010»
14 years 8 months ago
Neural Systems Underlying Decisions about Affective Odors
■ Decision-making about affective value may occur after the reward value of a stimulus is represented and may involve different brain areas to those involved in decision-making ...
Edmund T. Rolls, Fabian Grabenhorst, Benjamin A. P...
JOCN
2010
104views more  JOCN 2010»
14 years 8 months ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...
JSAC
2010
131views more  JSAC 2010»
14 years 8 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
JUCS
2010
161views more  JUCS 2010»
14 years 8 months ago
Evaluating Linear XPath Expressions by Pattern-Matching Automata
: We consider the problem of efficiently evaluating a large number of XPath expressions, especially in the case when they define subscriber profiles for filtering of XML documen...
Panu Silvasti, Seppo Sippu, Eljas Soisalon-Soinine...
« Prev « First page 2280 / 2351 Last » Next »