Sciweavers

1066 search results - page 213 / 214
» Computing Private Set Operations with Linear Complexities
Sort
View
IFIP3
1998
151views Education» more  IFIP3 1998»
13 years 6 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...
BMCBI
2010
154views more  BMCBI 2010»
13 years 4 months ago
Binary image representation of a ligand binding site: its application to efficient sampling of a conformational ensemble
Background: Modelling the ligand binding site of a protein is an important component of understanding proteinligand interactions and is being actively studied. Even if the side ch...
Edon Sung, Sangsoo Kim, Whanchul Shin
BMCBI
2006
143views more  BMCBI 2006»
13 years 4 months ago
Fast estimation of the difference between two PAM/JTT evolutionary distances in triplets of homologous sequences
Background: The estimation of the difference between two evolutionary distances within a triplet of homologs is a common operation that is used for example to determine which of t...
Christophe Dessimoz, Manuel Gil, Adrian Schneider,...
BMCBI
2007
141views more  BMCBI 2007»
13 years 4 months ago
Artificial neural network models for prediction of intestinal permeability of oligopeptides
Background: Oral delivery is a highly desirable property for candidate drugs under development. Computational modeling could provide a quick and inexpensive way to assess the inte...
Eunkyoung Jung, Junhyoung Kim, Minkyoung Kim, Dong...
CCS
2011
ACM
12 years 4 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta