Sciweavers

1834 search results - page 326 / 367
» Public Key Cryptography
Sort
View
ENTCS
2000
112views more  ENTCS 2000»
13 years 7 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
NAR
2000
135views more  NAR 2000»
13 years 7 months ago
HGBASE: a database of SNPs and other variations in and around human genes
Human genome polymorphism is expected to play a key role in defining the etiologic basis of phenotypic differences between individuals in aspects such as drug responses and common...
Anthony J. Brookes, Heikki Lehväslaiho, Maria...
IJWIN
2002
154views more  IJWIN 2002»
13 years 7 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
JGS
2002
78views more  JGS 2002»
13 years 7 months ago
Emerging and vector-borne diseases: Role of high spatial resolution and hyperspectral images in analyses and forecasts
Many infectious diseases that are emerging or transmitted by arthropod vectors have a strong link to landscape features. Depending on the source of infection or ecology of the tran...
Mark L. Wilson
DATAMINE
1999
140views more  DATAMINE 1999»
13 years 7 months ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...