Sciweavers

1712 search results - page 38 / 343
» A Computational Approach to Binding Theory
Sort
View
JCC
2011
109views more  JCC 2011»
14 years 2 months ago
VoteDock: Consensus docking method for prediction of protein-ligand interactions
: Molecular recognition plays a fundamental role in all biological processes, and that is why great efforts have been made to understand and predict protein–ligand interactions. ...
Dariusz Plewczynski, Michal Lazniewski, Marcin von...
CVPR
2004
IEEE
15 years 3 months ago
Motion Without Correspondence from Tomographic Projections by Bayesian Inversion Theory
In conventional tomography, the interior of an object is reconstructed from tomographic projections such as X-ray or electron microscope images. All the current reconstruction met...
Sami S. Brandt, Ville Kolehmainen
PODS
2006
ACM
138views Database» more  PODS 2006»
15 years 12 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
DALT
2004
Springer
15 years 5 months ago
Theories of Intentions in the Framework of Situation Calculus
Abstract. We propose an extension of action theories to intention theories in the framework of situation calculus. Moreover the method for implementing action theories is adapted t...
Maria del Pilar Pozos Parra, Abhaya C. Nayak, Robe...
ICCS
2009
Springer
15 years 6 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel