Sciweavers

20 search results - page 3 / 4
» Fair Identification
Sort
View
65
Voted
BMCBI
2008
106views more  BMCBI 2008»
14 years 9 months ago
Identification of hot-spot residues in protein-protein interactions by computational docking
Background: The study of protein-protein interactions is becoming increasingly important for biotechnological and therapeutic reasons. We can define two major areas therein: the s...
Solène Grosdidier, Juan Fernández-Re...
BMCBI
2004
207views more  BMCBI 2004»
14 years 9 months ago
Computational identification of transcription factor binding sites by functional analysis of sets of genes sharing overrep-resen
Background: Transcriptional regulation is a key mechanism in the functioning of the cell, and is mostly effected through transcription factors binding to specific recognition moti...
Davide Corà, Ferdinando Di Cunto, Paolo Pro...
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 9 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
DEXAW
2000
IEEE
112views Database» more  DEXAW 2000»
15 years 1 months ago
A Framework for Electronic Negotiations Based on Adjusted-Winner Mediation
This paper presents the design of a procedural framework for an electronic market mediation service based on the adjusted-winner procedure for fair division. The main benefit of a...
Michael Ströbel
103
Voted
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 11 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...