Sciweavers

1540 search results - page 269 / 308
» Embedded Systems Resources: Views on Modeling and Analysis
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
CICLING
2001
Springer
14 years 7 days ago
Spatio-temporal Indexing in Database Semantics
In logic, the spatio-temporal location of a proposition is characterized precisely within a Cartesian system of space and time coordinates. This is suitable for characterizing the ...
Roland Hausser
BMCBI
2010
191views more  BMCBI 2010»
13 years 7 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
14 years 2 months ago
Bridging Socio-Technical Capital in an Online Learning Environment
This work is based on the premise that online learning environments can potentially help develop communities of scholars by enabling participants to discover persons and resources...
Daniel D. Suthers, Kar-Hai Chu, Samuel Joseph
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 2 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...