Sciweavers

537 search results - page 104 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ASIACRYPT
2003
Springer
14 years 19 days ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
AUTOMOTIVEUI
2009
ACM
14 years 3 days ago
Towards an H-Mode for highly automated vehicles: driving with side sticks
The increasing traffic volume confronts the road user with a challenging task. The high number of traffic deaths might not be reducible with passive safety alone. However systems ...
Martin Kienle, Daniel Damböck, Johann Kelsch,...
EC
2000
187views ECommerce» more  EC 2000»
13 years 7 months ago
Comparison of Multiobjective Evolutionary Algorithms: Empirical Results
In this paper, we provide a systematic comparison of various evolutionary approaches to multiobjective optimization using six carefully chosen test functions. Each test function i...
Eckart Zitzler, Kalyanmoy Deb, Lothar Thiele
BMCBI
2007
155views more  BMCBI 2007»
13 years 7 months ago
ProMEX: a mass spectral reference database for proteins and protein phosphorylation sites
Background: In the last decade, techniques were established for the large scale genome-wide analysis of proteins, RNA, and metabolites, and database solutions have been developed ...
Jan Hummel, Michaela Niemann, Stefanie Wienkoop, W...
BMCBI
2004
95views more  BMCBI 2004»
13 years 7 months ago
PCOGR: Phylogenetic COG ranking as an online tool to judge the specificity of COGs with respect to freely definable groups of or
Background: The rapidly increasing number of completely sequenced genomes led to the establishment of the COG-database which, based on sequence homologies, assigns similar protein...
Florian Meereis, Michael Kaufmann