Sciweavers

2187 search results - page 322 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 2 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
ITPRO
2007
101views more  ITPRO 2007»
13 years 9 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton
BMCBI
2007
146views more  BMCBI 2007»
13 years 9 months ago
Towards Semantic e-Science for Traditional Chinese Medicine
Background: Recent advances in Web and information technologies with the increasing decentralization of organizational structures have resulted in massive amounts of information r...
Huajun Chen, Yuxin Mao, Xiaoqing Zheng, Meng Cui, ...
BMCBI
2006
122views more  BMCBI 2006»
13 years 9 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson