Sciweavers

1744 search results - page 306 / 349
» The Steganographic File System
Sort
View
140
Voted
TC
2008
15 years 3 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
129
Voted
COMPSEC
2004
104views more  COMPSEC 2004»
15 years 3 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
128
Voted
NAR
2000
109views more  NAR 2000»
15 years 3 months ago
The ASTRAL compendium for protein structure and sequence analysis
The ASTRAL compendium provides several databases and tools to aid in the analysis of protein structures, particularly through the use of their sequences. The SPACI scores included...
Steven E. Brenner, Patrice Koehl, Michael Levitt
177
Voted
DATAMINE
1999
140views more  DATAMINE 1999»
15 years 3 months ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...
155
Voted
RML
2002
162views Business» more  RML 2002»
15 years 3 months ago
A Markup Language for ORM Business Rules
Conceptual modeling techniques such as EER, ORM and to some extent the UML have been developed in the past for building information systems. These techniques or suitable extensions...
Jan Demey, Mustafa Jarrar, Robert Meersman