Sciweavers

114 search results - page 10 / 23
» What makes a gene name
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
ECUMN
2007
Springer
14 years 1 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
CCGRID
2005
IEEE
14 years 1 months ago
Object-oriented SPMD
— This article presents an evolution of classical SPMD programming for clusters and grids. It is named ”Object-Oriented SPMD” as it is based on remote method invocation. More...
Laurent Baduel, Françoise Baude, Denis Caro...
AOSD
2003
ACM
14 years 20 days ago
Aspects and polymorphism in AspectJ
There are two important points of view on inclusion or subtype polymorphism in object-oriented programs, namely polymorphic access and dynamic dispatch. These features are essenti...
Erik Ernst, David H. Lorenz
SPW
1999
Springer
13 years 11 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson