Sciweavers

7694 search results - page 1512 / 1539
» An Implementation of an Applicative File System
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 6 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
BMCBI
2004
154views more  BMCBI 2004»
13 years 6 months ago
Computation of elementary modes: a unifying framework and the new binary approach
Background: Metabolic pathway analysis has been recognized as a central approach to the structural analysis of metabolic networks. The concept of elementary (flux) modes provides ...
Julien Gagneur, Steffen Klamt
CG
1999
Springer
13 years 6 months ago
An interactive visualization and navigation tool for medical volume data
In order to make direct volume rendering practicable convenient visualization options and data analysis tools have to be integrated. For example, direct rendering of semi-transpar...
Ove Sommer, Alexander Dietz, Rüdiger Westerma...
GI
2010
Springer
13 years 5 months ago
Is it Possible to Interact with a Handheld Device While Holding it in Both Hands?
Abstract: Intuitiveness, attractiveness and efficiency are in general important characteristics of high quality User Interfaces (UI). In the case of a Mass Casualty Incident (MCI)...
Tayfur Coskun, Eva Artinger, Simon Nestler, Amal B...
COMPSAC
2010
IEEE
13 years 4 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
« Prev « First page 1512 / 1539 Last » Next »