Sciweavers

13224 search results - page 2579 / 2645
» Self-monitoring for Computer Users
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 1 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
GECCO
2007
Springer
165views Optimization» more  GECCO 2007»
14 years 1 months ago
Peptide detectability following ESI mass spectrometry: prediction using genetic programming
The accurate quantification of proteins is important in several areas of cell biology, biotechnology and medicine. Both relative and absolute quantification of proteins is often d...
David C. Wedge, Simon J. Gaskell, Simon J. Hubbard...
ICN
2007
Springer
14 years 1 months ago
CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic
Long-range dependence characteristics have been observed in many natural or physical phenomena. In particular, a significant impact on data network performance has been shown in se...
Karim Mohammed Rezaul, Vic Grout
IPSN
2007
Springer
14 years 1 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
MIDDLEWARE
2007
Springer
14 years 1 months ago
Self-adaptation of event-driven component-oriented middleware using aspects of assembly
Pervasive devices are becoming popular and smaller. Those mobile systems should be able to adapt to changing requirements and execution environments. But it requires the ability t...
Daniel Cheung-Foo-Wo, Jean-Yves Tigli, Stephane La...
« Prev « First page 2579 / 2645 Last » Next »