Sciweavers

1834 search results - page 297 / 367
» Public Key Cryptography
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
BMCBI
2004
98views more  BMCBI 2004»
13 years 7 months ago
STING Millennium Suite: integrated software for extensive analyses of 3d structures of proteins and their complexes
Background: The integration of many aspects of protein/DNA structure analysis is an important requirement for software products in general area of structural bioinformatics. In fa...
Roberto H. Higa, Roberto C. Togawa, Arnaldo J. Mon...
CG
2004
Springer
13 years 7 months ago
Multi-channel publishing of interactive multimedia presentations
The ongoing convergence between TV and the Internet leads traditional broadcast companies to publish their content on the Internet. Interactive digital TV platforms, which support...
Steven Van Assche, Filip Hendrickx, Nico Oorts, Lo...
IPM
2002
86views more  IPM 2002»
13 years 7 months ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
GIS
2010
ACM
13 years 6 months ago
Detecting nearly duplicated records in location datasets
The quality of a local search engine, such as Google and Bing Maps, heavily relies on its geographic datasets. Typically, these datasets are obtained from multiple sources, e.g., ...
Yu Zheng, Xixuan Fen, Xing Xie, Shuang Peng, James...