Sciweavers

267 search results - page 15 / 54
» Access Keys Warehouse: A New Approach to the Development of ...
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 7 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
BMCBI
2010
190views more  BMCBI 2010»
13 years 8 months ago
APIS: accurate prediction of hot spots in protein interfaces by combining protrusion index with solvent accessibility
Background: It is well known that most of the binding free energy of protein interaction is contributed by a few key hot spot residues. These residues are crucial for understandin...
Jun-Feng Xia, Xing-Ming Zhao, Jiangning Song, De-S...
ASPLOS
2008
ACM
13 years 9 months ago
The potential for variable-granularity access tracking for optimistic parallelism
Support for optimistic parallelism such as thread-level speculation (TLS) and transactional memory (TM) has been proposed to ease the task of parallelizing software to exploit the...
Mihai Burcea, J. Gregory Steffan, Cristiana Amza
SEM
2004
Springer
14 years 1 months ago
A Middleware Centric Approach to Building Self-Adapting Systems
The use of handheld networked devices to access information systems by people moving around is spreading rapidly. Systems being used in this way typically face dynamic variation in...
Svein O. Hallsteinsen, Jacqueline Floch, Erlend St...
JUCS
2002
132views more  JUCS 2002»
13 years 7 months ago
Managing User Focused Access to Distributed Knowledge
: Community web sites exhibit the property that multiple content providers exist. Of course, any portal is only as useful as the quality and amount of its content. Developing origi...
Rudi Studer, York Sure, Raphael Volz