Sciweavers

53327 search results - page 10587 / 10666
» or 2007
Sort
View
IJHPCA
2007
118views more  IJHPCA 2007»
13 years 8 months ago
Implementing MPI-IO Atomic Mode and Shared File Pointers Using MPI One-Sided Communication
The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of a variety of underlying storage targets. These targets vary widely in their ca...
Robert Latham, Robert B. Ross, Rajeev Thakur
IJISEC
2007
119views more  IJISEC 2007»
13 years 8 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
IJISEC
2007
61views more  IJISEC 2007»
13 years 8 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
IJMI
2007
86views more  IJMI 2007»
13 years 8 months ago
Using argumentation to extract key sentences from biomedical abstracts
s from Biomedical Abstracts Patrick Rucha , Celia Boyer c , Christine Chichesterb , Imad Tbahritiab Antoine Geissbühlera , Paul Fabrya , Julien Gobeilla , Violaine Pilletab , Diet...
Patrick Ruch, Célia Boyer, Christine Chiche...
IJMMS
2007
173views more  IJMMS 2007»
13 years 8 months ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
« Prev « First page 10587 / 10666 Last » Next »