Sciweavers

26071 search results - page 5041 / 5215
» Making the
Sort
View
156
Voted
JCS
2010
104views more  JCS 2010»
15 years 2 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JCST
2010
119views more  JCST 2010»
15 years 2 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JIDM
2010
155views more  JIDM 2010»
15 years 2 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
JOCN
2010
99views more  JOCN 2010»
15 years 2 months ago
"Virus and Epidemic": Causal Knowledge Activates Prediction Error Circuitry
■ Knowledge about cause and effect relationships (e.g., virus– epidemic) is essential for predicting changes in the environment and for anticipating the consequences of events...
Daniela B. Fenker, Mircea Ariel Schoenfeld, Michae...
JOCN
2010
85views more  JOCN 2010»
15 years 2 months ago
Neural Systems Underlying Decisions about Affective Odors
■ Decision-making about affective value may occur after the reward value of a stimulus is represented and may involve different brain areas to those involved in decision-making ...
Edmund T. Rolls, Fabian Grabenhorst, Benjamin A. P...
« Prev « First page 5041 / 5215 Last » Next »