Sciweavers

6590 search results - page 1307 / 1318
» Evaluating the performance engineering process
Sort
View
BMCBI
2005
104views more  BMCBI 2005»
13 years 7 months ago
An integrated approach of immunogenomics and bioinformatics to identify new Tumor Associated Antigens (TAA) for mammary cancer i
Background: Neoplastic transformation is a multistep process in which distinct gene products of specific cell regulatory pathways are involved at each stage. Identification of ove...
Federica Cavallo, Annalisa Astolfi, Manuela Iezzi,...
JEI
2007
102views more  JEI 2007»
13 years 7 months ago
Testing tone mapping operators with human-perceived reality
Abstract. A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic rang...
Akiko Yoshida, Volker Blanz, Karol Myszkowski, Han...
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 7 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
JIPS
2007
223views more  JIPS 2007»
13 years 7 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 1307 / 1318 Last » Next »