Sciweavers

90 search results - page 18 / 18
» Specifying Authentication Protocols Using Rewriting and Stra...
Sort
View
BMCBI
2008
118views more  BMCBI 2008»
13 years 5 months ago
DOVIS: an implementation for high-throughput virtual screening using AutoDock
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
SIGCOMM
2006
ACM
13 years 11 months ago
Systematic topology analysis and generation using degree correlations
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 5 months ago
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations
A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance...
Mahalakshmi Chidambara Natarajan, Ramaswamy Muthia...
JCS
2010
135views more  JCS 2010»
13 years 4 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
COST
1994
Springer
127views Multimedia» more  COST 1994»
13 years 9 months ago
Support for High-Performance Multipoint Multimedia Services
Existing and upcoming distributed multimedia applications require highly diverse services to satisfy their communication needs. Service integrated communication systems should be c...
Georg Carle, Jochen H. Schiller, Claudia Schmidt