Sciweavers

1449 search results - page 172 / 290
» Secure and Efficient Metering
Sort
View
SAINT
2007
IEEE
15 years 11 months ago
A HIP Based Network Mobility Protocol
– The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and ch...
Szabolcs Nováczki, László Bok...
172
Voted
BIOSURVEILLANCE
2007
Springer
15 years 10 months ago
Detecting Conserved RNA Secondary Structures in Viral Genomes: The RADAR Approach
Abstract. Conserved regions, or motifs, present among RNA secondary structures serve as a useful indicator for predicting the functionality of the RNA molecules. Automated detectio...
Mugdha Khaladkar, Jason T. L. Wang
HPDC
1999
IEEE
15 years 9 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
ACSAC
1998
IEEE
15 years 9 months ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
SACRYPT
1998
Springer
173views Cryptology» more  SACRYPT 1998»
15 years 8 months ago
A Lattice-Based Public-Key Cryptosystem
In 1998, Cai and Cusick proposed a lattice-based public-key cryptosystem based on the similar ideas of the Ajtai-Dwork cryptosystem, but with much less data expansion. However, th...
Jin-yi Cai, Thomas W. Cusick