Sciweavers

5684 search results - page 307 / 1137
» Computing with active dendrites
Sort
View
BMCBI
2006
84views more  BMCBI 2006»
15 years 4 months ago
Representation of target-bound drugs by computed conformers: implications for conformational libraries
Background: The increasing number of known protein structures provides valuable information about pharmaceutical targets. Drug binding sites are identifiable and suitable lead com...
Stefan Günther, Christian Senger, Elke Michal...
TSE
1998
93views more  TSE 1998»
15 years 4 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
JUCS
2010
162views more  JUCS 2010»
15 years 3 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 3 months ago
Computer Aided Design Modeling for Heterogeneous Objects
Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not conta...
Vikas Gupta, K. S. Kasana, Puneet Tandon
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
16 years 5 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...