Sciweavers

2111 search results - page 399 / 423
» How to Program Pervasive Systems
Sort
View
CSREASAM
2006
13 years 9 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
BMCBI
2005
127views more  BMCBI 2005»
13 years 7 months ago
Dynamic modeling of cis-regulatory circuits and gene expression prediction via cross-gene identification
Background: Gene expression programs depend on recognition of cis elements in promoter region of target genes by transcription factors (TFs), but how TFs regulate gene expression ...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...
TSE
1998
116views more  TSE 1998»
13 years 7 months ago
A Framework-Based Approach to the Development of Network-Aware Applications
— Modern networks provide a QoS (quality of service) model to go beyond best-effort services, but current QoS models are oriented towards low-level network parameters (e.g., band...
Jürg Bolliger, Thomas R. Gross
INDOCRYPT
2010
Springer
13 years 5 months ago
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...
EUROSYS
2006
ACM
14 years 5 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...