Sciweavers

818 search results - page 157 / 164
» Mobile Robot Localization based on a Polynomial Approach
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
BMCBI
2006
172views more  BMCBI 2006»
13 years 7 months ago
Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information
Background: The majority of peptide bonds in proteins are found to occur in the trans conformation. However, for proline residues, a considerable fraction of Prolyl peptide bonds ...
Jiangning Song, Kevin Burrage, Zheng Yuan, Thomas ...
WOWMOM
2006
ACM
137views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Evaluating Context Information Predictability for Autonomic Communication
Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
Mirco Musolesi, Cecilia Mascolo
LCN
2005
IEEE
14 years 1 months ago
Network Management Challenges for Next Generation Networks
Generally, current network management technologies follow two approaches: ITU-T’s recommendations for Telecommunication Management Network (TMN) and IETF’s Simple Network Mana...
Mo Li, Kumbesan Sandrasegaran
ICDS
2009
IEEE
14 years 2 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton