Sciweavers

1998 search results - page 260 / 400
» Complexity of the Cover Polynomial
Sort
View
JCC
2011
154views more  JCC 2011»
14 years 3 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 7 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
87
Voted
ICCD
2005
IEEE
119views Hardware» more  ICCD 2005»
15 years 9 months ago
Deployment of Better Than Worst-Case Design: Solutions and Needs
The advent of nanometer feature sizes in silicon fabrication has triggered a number of new design challenges for computer designers. These challenges include design complexity and...
Todd M. Austin, Valeria Bertacco
92
Voted
SEMWEB
2009
Springer
15 years 7 months ago
Graph-Based Ontology Construction from Heterogenous Evidences
Abstract. Ontologies are tools for describing and structuring knowledge, with many applications in searching and analyzing complex knowledge bases. Since building them manually is ...
Christoph Böhm, Philip Groth, Ulf Leser
124
Voted
IROS
2007
IEEE
179views Robotics» more  IROS 2007»
15 years 7 months ago
Stereo-based 6D object localization for grasping with humanoid robot systems
Abstract— Robust vision-based grasping is still a hard problem for humanoid robot systems. When being restricted to using the camera system built-in into the robot’s head for o...
Pedram Azad, Tamim Asfour, Rüdiger Dillmann