Sciweavers

1126 search results - page 185 / 226
» Modularity and the Rule of Adaptation
Sort
View
RSA
2008
80views more  RSA 2008»
13 years 9 months ago
The persistent-access-caching algorithm
ABSTRACT: Caching is widely recognized as an effective mechanism for improving the performance of the World Wide Web. One of the key components in engineering the Web caching syste...
Predrag R. Jelenkovic, Ana Radovanovic
RECOMB
2005
Springer
14 years 11 months ago
Pairwise Local Alignment of Protein Interaction Networks Guided by Models of Evolution
Abstract. With ever increasing amount of available data on protein-protein interaction (PPI) networks and research revealing that these networks evolve at a modular level, discover...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...
MOBISYS
2004
ACM
14 years 10 months ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
ICDCSW
2005
IEEE
14 years 4 months ago
DiamondHelp: A Collaborative Interface Framework for Networked Home Appliances
DiamondHelp is a reusable Java framework for building graphical user interfaces based on the collaborative paradigm of human-computer interaction. DiamondHelp´s graphical design ...
Charles Rich, Candy L. Sidner, Neal Lesh, Andrew G...
ISW
2004
Springer
14 years 4 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner