Sciweavers

3717 search results - page 561 / 744
» Representing Multiple Theories
Sort
View
DASFAA
2004
IEEE
80views Database» more  DASFAA 2004»
15 years 8 months ago
Emergent Semantics Principles and Issues
Information and communication infrastructures underwent a rapid and extreme decentralization process over the past decade: From a world of statically and partially connected centra...
Karl Aberer, Philippe Cudré-Mauroux, Aris M...
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 8 months ago
Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach
Future Systems-on-Chips will include multiple heterogeneous processing units, with complex data-dependent shared resource access patterns dictating the performance of a design. Cu...
Alex Bobrek, Joshua J. Pieper, Jeffrey E. Nelson, ...
CCS
2006
ACM
15 years 8 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
COMPLIFE
2006
Springer
15 years 8 months ago
A Point-Matching Based Algorithm for 3D Surface Alignment of Drug-Sized Molecules
Abstract. Molecular shapes play an important role in molecular interactions, e.g., between a protein and a ligand. The `outer' shape of a molecule can be approximated by its s...
Daniel Baum, Hans-Christian Hege
FPL
2004
Springer
119views Hardware» more  FPL 2004»
15 years 8 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar