Sciweavers

978 search results - page 181 / 196
» WiMAX networks: from access to service platform
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
FODO
1993
Springer
110views Algorithms» more  FODO 1993»
15 years 1 months ago
Storage System Architectures for Continuous Media Data
Abstract. Data storage systems are being called on to manage continuous media data types, such as digital audio and video. There is a demand by applications for \constrained-latenc...
David Maier, Jonathan Walpole, Richard Staehli
BMCBI
2010
139views more  BMCBI 2010»
14 years 9 months ago
TOPSAN: a collaborative annotation environment for structural genomics
Background: Many protein structures determined in high-throughput structural genomics centers, despite their significant novelty and importance, are available only as PDB depositi...
Dana Weekes, S. Sri Krishna, Constantina Bakolitsa...
COMSWARE
2008
IEEE
15 years 4 months ago
An efficient and bandwidth sensitive parallel download scheme in data grids
—For modern scientific applications such as astrophysics, astronomy, aerography, and biology, a large amount of storage space is required because of the large-scale datasets. Dat...
Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, ...
ISW
2004
Springer
15 years 3 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...