Sciweavers

788 search results - page 128 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
CCS
2001
ACM
14 years 9 days ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
TON
2010
210views more  TON 2010»
13 years 2 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska
CGF
2010
189views more  CGF 2010»
13 years 8 months ago
Space-in-Time and Time-in-Space Self-Organizing Maps for Exploring Spatiotemporal Patterns
Spatiotemporal data pose serious challenges to analysts in geographic and other domains. Owing to the complexity of the geospatial and temporal components, this kind of data canno...
Gennady L. Andrienko, Natalia V. Andrienko, Sebast...
CASES
2005
ACM
13 years 9 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
BMCBI
2008
121views more  BMCBI 2008»
13 years 8 months ago
iRefIndex: A consolidated protein interaction database with provenance
Background: Interaction data for a given protein may be spread across multiple databases. We set out to create a unifying index that would facilitate searching for these data and ...
Sabry Razick, George Magklaras, Ian M. Donaldson