Sciweavers

3972 search results - page 73 / 795
» Design of the iSCSI Protocol
Sort
View
CNSM
2010
13 years 7 months ago
Gossip-based resource management for cloud environments
1 We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architectur...
Fetahi Wuhib, Rolf Stadler, Mike Spreitzer
JCAMD
2010
92views more  JCAMD 2010»
13 years 3 months ago
Ligand docking and binding site analysis with PyMOL and Autodock/Vina
Docking of small molecule compounds into the binding site of a receptor and estimating the binding affinity of the complex is an important part of the structurebased drug design pr...
Daniel Seeliger, Bert L. de Groot
JOC
2007
93views more  JOC 2007»
13 years 9 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
NTMS
2008
IEEE
14 years 3 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
MOBICOM
2004
ACM
14 years 2 months ago
Vehicle-to-vehicle safety messaging in DSRC
— This paper studies the design of layer-2 protocols for a vehicle to send safety messages to other vehicles. The target is to send vehicle safety messages with high reliability ...
Qing Xu 0007, Tony K. Mak, Jeff Ko, Raja Sengupta