Sciweavers

2187 search results - page 330 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
AINA
2009
IEEE
14 years 4 months ago
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now sponta...
Roberto G. Cascella
PERCOM
2005
ACM
14 years 8 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
BMCBI
2010
152views more  BMCBI 2010»
13 years 9 months ago
FITBAR: a web tool for the robust prediction of prokaryotic regulons
Background: The binding of regulatory proteins to their specific DNA targets determines the accurate expression of the neighboring genes. The in silico prediction of new binding s...
Jacques Oberto
WPES
2003
ACM
14 years 2 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao
CLUSTER
1999
IEEE
13 years 9 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz