Sciweavers

1116 search results - page 39 / 224
» Secure Mediation: Requirements and Design
Sort
View
BMCBI
2004
151views more  BMCBI 2004»
13 years 9 months ago
Design, implementation and evaluation of a practical pseudoknot folding algorithm based on thermodynamics
Background: The general problem of RNA secondary structure prediction under the widely used thermodynamic model is known to be NP-complete when the structures considered include a...
Jens Reeder, Robert Giegerich
IMCS
2007
78views more  IMCS 2007»
13 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
POPL
2005
ACM
14 years 9 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
WWW
2006
ACM
14 years 9 months ago
On a service-oriented approach for an engineering knowledge desktop
Increasingly, manufacturing companies are shifting their focus from selling products to providing services. As a result, when designing new products, engineers must increasingly c...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 1 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt