Sciweavers

790 search results - page 129 / 158
» Designated Confirmer Signatures
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
WABI
2009
Springer
142views Bioinformatics» more  WABI 2009»
14 years 2 months ago
Back-Translation for Discovering Distant Protein Homologies
Background: Frameshift mutations in protein-coding DNA sequences produce a drastic change in the resulting protein sequence, which prevents classic protein alignment methods from ...
Marta Gîrdea, Laurent Noé, Gregory Ku...
ACMACE
2009
ACM
14 years 2 months ago
Power explorer: a casual game style for encouraging long term behavior change among teenagers
When it comes to motivating teenagers towards energy awareness, new approaches need to be considered. One such is the use of pervasive games connected to the players own energy co...
Anton Gustafsson, Magnus Bång, Mattias Svahn
SIGSOFT
2005
ACM
14 years 1 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
JCDL
2004
ACM
134views Education» more  JCDL 2004»
14 years 1 months ago
Exploring the relationship between personal and public annotations
Today people typically read and annotate printed documents even if they are obtained from electronic sources like digital libraries. If there is a reason for them to share these p...
Catherine C. Marshall, A. J. Bernheim Brush