Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
— The European IST research projects WINNER and WINNER II aim at developing a single new ubiquitous radio access system concept that can be adapted for use in a wide variety of m...
The preservation of digital artifacts represents an unanswered challenge for the modern information society: XML and its query languages provide an effective environment to addre...
In this paper we describe an emerging form of wikis - wikis of locality – that support physical rather than virtual communities. We draw on our experience as administrators of t...
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. The two most common experim...
Paul E. Anderson, Douglas W. Raiford, Deacon J. Sw...