Sciweavers

391 search results - page 70 / 79
» als 2003
Sort
View
OZCHI
2006
ACM
14 years 1 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
BIRTHDAY
2005
Springer
14 years 1 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
AGP
2003
IEEE
14 years 24 days ago
Interpreting Abduction in CLP
Constraint Logic Programming (CLP) and Abductive Logic Programming (ALP) share the important concept of conditional answer. We exploit their deep similarities to implement an effic...
Marco Gavanelli, Evelina Lamma, Paola Mello, Miche...
CSFW
2003
IEEE
14 years 24 days ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
ICMENS
2003
IEEE
80views Hardware» more  ICMENS 2003»
14 years 23 days ago
Molecular Dynamics Calculations of the Electrostatic Properties of Tubulin and Their Consequences for Microtubules
crystallographic results were made available through the Protein Data Bank (PDB) (entries: ITUB and IJFF) which allowed us to view the 3D atomic resolution structure oftubulin. (se...
J. A. Tuszynski, E. J. Carpenter, E. Crawford, J. ...