Sciweavers

451 search results - page 40 / 91
» P Systems and Topology: Some Suggestions for Research
Sort
View
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 1 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
EUSAI
2004
Springer
14 years 1 months ago
End-User Configuration of Ambient Intelligence Environments: Feasibility from a User Perspective
Abstract. We report research into concepts and technology for enabling endusers to configure Ambient Intelligent environments. In this paper we focus on the feasibility and accepta...
Panos Markopoulos, Irene Mavrommati, Achilles Kame...
FTWEB
2006
141views more  FTWEB 2006»
13 years 7 months ago
A Framework for Web Science
This text sets out a series of approaches to the analysis and synthesis of the World Wide Web, and other web-like information structures. A comprehensive set of research questions...
Tim Berners-Lee, Wendy Hall, James A. Hendler, Kie...
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 27 days ago
Bluenet II - A Detailed Realization of the Algorithm and Performance
The recent interest in ad hoc networks, in general, and in the Bluetooth technology, in particular, has stimulated much research in algorithms for topology control of such network...
Zhifang Wang, Zygmunt J. Haas, Robert J. Thomas
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 4 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...