Sciweavers

220 search results - page 40 / 44
» Trusted business system model using context sensitiveness
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Complex Network Measurements: Estimating the Relevance of Observed Properties
Abstract—Complex networks, modeled as large graphs, received much attention during these last years. However, data on such networks is only available through intricate measuremen...
Matthieu Latapy, Clémence Magnien
IUI
2009
ACM
14 years 4 months ago
Rich interfaces for reading news on the web
Using content-specific models to guide information retrieval and extraction can provide richer interfaces to endusers for both understanding the context of news events and navigat...
Earl J. Wagner, Jiahui Liu, Larry Birnbaum, Kennet...
BMCBI
2005
158views more  BMCBI 2005»
13 years 7 months ago
Automated generation of heuristics for biological sequence comparison
Background: Exhaustive methods of sequence alignment are accurate but slow, whereas heuristic approaches run quickly, but their complexity makes them more difficult to implement. ...
Guy St. C. Slater, Ewan Birney
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
WECWIS
2003
IEEE
102views ECommerce» more  WECWIS 2003»
14 years 26 days ago
FUSION: A System Allowing Dynamic Web Service Composition and Automatic Execution
Service portals are systems which expose a bundle of web services to the user, allowing the specification and subsequent execution of complex tasks defined over these individual...
Debra E. VanderMeer, Anindya Datta, Kaushik Dutta,...