Sciweavers

563 search results - page 102 / 113
» Verifiable Signature Sharing
Sort
View
INFOVIS
2005
IEEE
14 years 2 months ago
The Visual Code Navigator: An Interactive Toolset for Source Code Investigation
We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspective...
Gerard Lommerse, Freek Nossin, Lucian Voinea, Alex...
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ASIACRYPT
2001
Springer
14 years 1 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
BIBE
2007
IEEE
129views Bioinformatics» more  BIBE 2007»
14 years 24 days ago
Statistial Analysis of nucleosome occupancy and histone modification data
Abstract-- In eukaryotic cells, genomic DNAs wrap around beadlike molecules, called nucleosomes, so as to pack more compactly in the nucleus of the cell. The nucleosome is made up ...
Guo-Cheng Yuan, Jun S. Liu
CCS
2008
ACM
13 years 10 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton