Sciweavers

3395 search results - page 33 / 679
» Designs, Disputes and Strategies
Sort
View
JNW
2006
145views more  JNW 2006»
13 years 7 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
CCS
2001
ACM
14 years 5 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
BMCBI
2005
105views more  BMCBI 2005»
13 years 7 months ago
SNPHunter: a bioinformatic software for single nucleotide polymorphism data acquisition and management
Background: Single nucleotide polymorphisms (SNPs) provide an important tool in pinpointing susceptibility genes for complex diseases and in unveiling human molecular evolution. S...
Lin Wang, Simin Liu, Tianhua Niu, Xin Xu
HICSS
2005
IEEE
156views Biometrics» more  HICSS 2005»
14 years 1 months ago
Strategies Supporting Heterogeneous Data and Interdisciplinary Collaboration: Towards an Ocean Informatics Environment
This paper considers the elements and challenges of heterogeneous data management and interdisciplinary collaboration, drawing from the literatures on participatory design, comput...
Karen S. Baker, Steven J. Jackson, Jerome R. Wanet...
ENTCS
2008
65views more  ENTCS 2008»
13 years 7 months ago
Rules and Strategies in Java
In this paper we present the essential feature we have considered when designing a new language based on rules and strategies. Relying on the implementation of Tom, we explain how...
Pierre-Etienne Moreau, Antoine Reilles