Sciweavers

15251 search results - page 3033 / 3051
» Network Science - Theory and Application
Sort
View
BMCBI
2005
142views more  BMCBI 2005»
13 years 8 months ago
High performance workflow implementation for protein surface characterization using grid technology
Background: This study concerns the development of a high performance workflow that, using grid technology, correlates different kinds of Bioinformatics data, starting from the ba...
Ivan Merelli, Giulia Morra, Daniele D'Agostino, An...
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JNCA
2007
154views more  JNCA 2007»
13 years 8 months ago
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption
Intelligent, server-side adaptation of multimedia resources is becoming increasingly important and challenging for two reasons. First, the market continuously brings up new mobile...
Dietmar Jannach, Klaus Leopold
JNW
2007
100views more  JNW 2007»
13 years 8 months ago
Towards a Novel Metadata Information Service for Distributed Data Management
— The trend in Grid computing towards more data intensive applications, accessing more and more relational databases and requiring advanced integration of secondhand and publicly...
Alexander Wöhrer, Peter Brezany
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
« Prev « First page 3033 / 3051 Last » Next »