Sciweavers

229 search results - page 15 / 46
» A General Name Binding Mechanism
Sort
View
IMC
2004
ACM
14 years 3 months ago
The root of the matter: hints or slaves
We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
David Malone
AINA
2007
IEEE
14 years 1 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
BMCBI
2005
122views more  BMCBI 2005»
13 years 9 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
FSEN
2009
Springer
14 years 4 months ago
A Safe Implementation of Dynamic Overloading in Java-Like Languages
We present a general technique for extending Java-like languages with dynamic overloading, where method selection depends on the dynamic type of the parameter, instead of just the ...
Lorenzo Bettini, Sara Capecchi, Betti Venneri
JAVA
1999
Springer
14 years 2 months ago
Object Serialization for Marshalling Data in a Java Interface to MPI
Several Java bindings of the Message Passing Interface standard, MPI, have been developed recently. Message bu ers have usually been restricted to arrays with elements of primitiv...
Bryan Carpenter, Geoffrey Fox, Sung Hoon Ko, Sang ...