Sciweavers

106 search results - page 11 / 22
» Mississippi Computational Web Portal
Sort
View
PAM
2012
Springer
12 years 5 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
COMPSYSTECH
2009
13 years 7 months ago
Architectural models for realization of web-based personal health systems
: Recent advances in Information and Communication Technologies (ICT) and more specifically in wireless networks and mobile computing have driven new directions in the development ...
Mitko Shopov, Grisha Spasov, Galidia Petrova
NAR
2011
222views Computer Vision» more  NAR 2011»
13 years 20 days ago
Effective - a database of predicted secreted bacterial proteins
Protein secretion is a key virulence mechanism of pathogenic and symbiotic bacteria, which makes the investigation of secreted proteins (‘effectors’) crucial for understanding...
Marc-André Jehl, Roland Arnold, Thomas Ratt...
SKG
2006
IEEE
14 years 3 months ago
Semantic-driven Management and Search for Resources in Research Community
In recent years, semantic search has become one hot motivation of the semantic web. In this paper, we propose a semantic-based resource management and search architecture and its ...
Junsheng Zhang, Zhixian Yan
SWS
2006
ACM
14 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch