Sciweavers

346 search results - page 43 / 70
» Can we trust docking results
Sort
View
CSFW
2009
IEEE
14 years 2 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
ACSAC
2007
IEEE
14 years 2 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
VLDB
2007
ACM
229views Database» more  VLDB 2007»
14 years 1 months ago
Sum-Max Monotonic Ranked Joins for Evaluating Top-K Twig Queries on Weighted Data Graphs
In many applications, the underlying data (the web, an XML document, or a relational database) can be seen as a graph. These graphs may be enriched with weights, associated with t...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
BPM
2005
Springer
131views Business» more  BPM 2005»
14 years 1 months ago
Towards P2P-Based Semantic Web Service Discovery with QoS Support
The growing number of web services advocates distributed discovery infrastructures which are semantics-enabled and support quality of service (QoS). In this paper, we introduce a n...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer
GLOBECOM
2007
IEEE
14 years 2 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...