Sciweavers

1018 search results - page 136 / 204
» Remote User Authentication Using Public Information
Sort
View
BMCBI
2010
132views more  BMCBI 2010»
13 years 8 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
ASPLOS
2006
ACM
14 years 1 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
MOBISYS
2007
ACM
14 years 7 months ago
Universal real-time navigational assistance (URNA): an urban bluetooth beacon for the blind
We describe a complete hardware/software system, dubbed Universal Real-Time Navigational Assistance (URNA), which enables communication of relevant location-aware information to a...
S. Bohonos, A. Lee, A. Malik, C. Thai, Roberto Man...
ICONFERENCE
2011
13 years 2 months ago
Personalized location-based services
Location-Based Services (LBS) are based on a combination of the inherent location information about specific data, and/or the location information supplied by LBS clients, reques...
Yiming Liu, Erik Wilde
INFOCOM
2006
IEEE
14 years 2 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...