Sciweavers

1245 search results - page 184 / 249
» Physical Browsing Research
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
VTC
2006
IEEE
14 years 1 months ago
The WINNER B3G System MAC Concept
— The European IST research projects WINNER and WINNER II aim at developing a single new ubiquitous radio access system concept that can be adapted for use in a wide variety of m...
Mikael Sternad, Tommy Svensson, Göran Klang
WIDM
2006
ACM
14 years 1 months ago
Bridging relational database history and the web: the XML approach
The preservation of digital artifacts represents an unanswered challenge for the modern information society: XML and its query languages provide an effective environment to addre...
Fusheng Wang, Xin Zhou, Carlo Zaniolo
WIKIS
2006
ACM
14 years 1 months ago
Wikis of locality: insights from the open guides
In this paper we describe an emerging form of wikis - wikis of locality – that support physical rather than virtual communities. We draw on our experience as administrators of t...
Mark Gaved, Tom Heath, Marc Eisenstadt
BIBE
2005
IEEE
116views Bioinformatics» more  BIBE 2005»
14 years 1 months ago
Stochastic Model of Protease-Ligand Reactions
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. The two most common experim...
Paul E. Anderson, Douglas W. Raiford, Deacon J. Sw...