Sciweavers

2912 search results - page 550 / 583
» Overlay Networks - Implementation by Specification
Sort
View
HUC
2010
Springer
13 years 7 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 6 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig

Publication
181views
13 years 5 months ago
Causality Applicatoin Ontology: A Therory of Definition Derived From Analytical Meditation
Advancing the synthesis of Eastern mind science with Western physical science will require a robust and easy-to-traverse bridge between the atypical apprehensions within meditation...
Samuel R Dismond III
WWW
2011
ACM
13 years 3 months ago
we.b: the web of short urls
Short URLs have become ubiquitous. Especially popular within social networking services, short URLs have seen a significant increase in their usage over the past years, mostly du...
Demetres Antoniades, Iasonas Polakis, Georgios Kon...
NC
2010
137views Neural Networks» more  NC 2010»
13 years 3 months ago
On the regularity of circular splicing languages: a survey and new developments
Circular splicing has been introduced to model a specific recombinant behaviour of circular DNA, continuing the investigation initiated with linear splicing. In this paper we focu...
Paola Bonizzoni, Clelia de Felice, Gabriele Fici, ...