Sciweavers

7189 search results - page 1324 / 1438
» Connecting Design with Code
Sort
View
BMCBI
2011
14 years 10 months ago
Implementation of Force Distribution Analysis for Molecular Dynamics simulations
Background: The way mechanical stress is distributed inside and propagated by proteins and other biopolymers largely defines their function. Yet, determining the network of intera...
Wolfram Stacklies, Christian Seifert, Frauke Graet...
183
Voted
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
14 years 6 months ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
158
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
156
Voted
CCS
2011
ACM
14 years 3 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
141
Voted
CCS
2011
ACM
14 years 3 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
« Prev « First page 1324 / 1438 Last » Next »