Sciweavers

21520 search results - page 4303 / 4304
» Symmetric network computation
Sort
View
BMCBI
2007
148views more  BMCBI 2007»
13 years 9 months ago
p53FamTaG: a database resource of human p53, p63 and p73 direct target genes combining in silico prediction and microarray data
Background: The p53 gene family consists of the three genes p53, p63 and p73, which have polyhedral non-overlapping functions in pivotal cellular processes such as DNA synthesis a...
Elisabetta Sbisà, Domenico Catalano, Giorgi...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 9 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
WWW
2009
ACM
14 years 9 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
EUROSYS
2008
ACM
14 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
EUROSYS
2006
ACM
14 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
« Prev « First page 4303 / 4304 Last » Next »