Sciweavers

57 search results - page 6 / 12
» The Requirements of Using Provenance in e-Science Experiment...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
HCI
2007
13 years 10 months ago
3D Modeling and Design Supported Via Interscopic Interaction Strategies
3D modeling applications are widely used in many application domains ranging from CAD to industrial or graphics design. Desktop environments have proven to be a powerful user inter...
Frank Steinicke, Timo Ropinski, Gerd Bruder, Klaus...
CASCON
2007
1035views Education» more  CASCON 2007»
13 years 10 months ago
An IDE for software development using tabular expressions
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
Dennis K. Peters, Mark Lawford, Baltasar Tranc&oac...
AINA
2006
IEEE
14 years 2 months ago
A Hybrid Rule-Based/Case-Based Reasoning Approach for Service Fault Diagnosis
— In today’s service market the provisioning of high quality services has become a critical issue for providers as the business success of their customers is often based on the...
Andreas Hanemann
BMCBI
2007
93views more  BMCBI 2007»
13 years 8 months ago
The topology of metabolic isotope labeling networks
Background: Metabolic Flux Analysis (MFA) based on isotope labeling experiments (ILEs) is a widely established tool for determining fluxes in metabolic pathways. Isotope labeling ...
Michael Weitzel, Wolfgang Wiechert, Katharina N&ou...