Sciweavers

2178 search results - page 428 / 436
» Toward Systemically Secure IT Architectures
Sort
View
BMCBI
2006
152views more  BMCBI 2006»
13 years 7 months ago
A two-stage approach for improved prediction of residue contact maps
Background: Protein topology representations such as residue contact maps are an important intermediate step towards ab initio prediction of protein structure. Although improvemen...
Alessandro Vullo, Ian Walsh, Gianluca Pollastri
COMPUTER
1998
119views more  COMPUTER 1998»
13 years 7 months ago
Virtual Memory: Issues of Implementation
ion layer3,4 hides hardware particulars from the higher levels of software but can also compromise performance and compatibility; the higher levels of software often make unwitting...
Bruce L. Jacob, Trevor N. Mudge
SIGCOMM
2012
ACM
11 years 10 months ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
SENSYS
2005
ACM
14 years 1 months ago
MAX: human-centric search of the physical world
MAX is a system that facilitates human-centric search of the physical world. It allows humans to search for and locate objects as and when they need it instead of organizing them ...
Kok-Kiong Yap, Vikram Srinivasan, Mehul Motani
SIMUTOOLS
2008
13 years 9 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...