Sciweavers

2519 search results - page 492 / 504
» Reasoning with Textual Cases
Sort
View
BMCBI
2005
97views more  BMCBI 2005»
14 years 9 months ago
Clustering the annotation space of proteins
Background: Current protein clustering methods rely on either sequence or functional similarities between proteins, thereby limiting inferences to one of these areas. Results: Her...
Victor Kunin, Christos A. Ouzounis
BMCBI
2005
156views more  BMCBI 2005»
14 years 9 months ago
A new dynamical layout algorithm for complex biochemical reaction networks
Background: To study complex biochemical reaction networks in living cells researchers more and more rely on databases and computational methods. In order to facilitate computatio...
Katja Wegner, Ursula Kummer
JCM
2007
101views more  JCM 2007»
14 years 9 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
TSE
2008
107views more  TSE 2008»
14 years 9 months ago
Interface Grammars for Modular Software Model Checking
We propose an interface specification language based on grammars for modular software model checking. In our interface specification language, component interfaces are specified a...
Graham Hughes, Tevfik Bultan
97
Voted
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin