Sciweavers

42388 search results - page 8197 / 8478
» Classification Using Information
Sort
View
CCS
2010
ACM
15 years 17 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
AISS
2010
146views more  AISS 2010»
14 years 11 months ago
Zatara, the Plug-in-able Eventually Consistent Distributed Database
With the proliferation of the computer Cloud, new software delivery methods were created. In order to build software to fit into one of these models, a scalable, easy to deploy st...
Bogdan Carstoiu, Dorin Carstoiu
BMCBI
2010
259views more  BMCBI 2010»
14 years 10 months ago
Rule-based spatial modeling with diffusing, geometrically constrained molecules
Background: We suggest a new type of modeling approach for the coarse grained, particle-based spatial simulation of combinatorially complex chemical reaction systems. In our appro...
Gerd Gruenert, Bashar Ibrahim, Thorsten Lenser, Ma...
BMCBI
2010
148views more  BMCBI 2010»
14 years 10 months ago
SKPDB: a structural database of shikimate pathway enzymes
Background: The functional and structural characterisation of enzymes that belong to microbial metabolic pathways is very important for structure-based drug design. The main inter...
Helen A. Arcuri, Geraldo F. D. Zafalon, Evandro A....
BMCBI
2010
125views more  BMCBI 2010»
14 years 10 months ago
ProbFAST: Probabilistic Functional Analysis System Tool
Background: The post-genomic era has brought new challenges regarding the understanding of the organization and function of the human genome. Many of these challenges are centered...
Israel T. da Silva, Ricardo Z. N. Vêncio, Th...
« Prev « First page 8197 / 8478 Last » Next »