Sciweavers

5722 search results - page 506 / 1145
» Security Function Interactions
Sort
View
BMCBI
2007
111views more  BMCBI 2007»
15 years 5 months ago
Modular co-evolution of metabolic networks
Background: The architecture of biological networks has been reported to exhibit high level of modularity, and to some extent, topological modules of networks overlap with known f...
Jing Zhao, Guohui Ding, Lin Tao, Hong Yu, Zhong-Ha...
CCS
2010
ACM
15 years 5 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
IPPS
2006
IEEE
15 years 11 months ago
Parallelization and performance characterization of protein 3D structure prediction of Rosetta
The prediction of protein 3D structure has become a hot research area in the post-genome era, through which people can understand a protein’s function in health and disease, exp...
Wenlong Li, Tao Wang, Eric Li, D. Baker, Li Jin, S...
BCSHCI
2007
15 years 6 months ago
How effective is it to design by voice?
Previous studies on usability of crowded graphical interfaces that are full of widgets like menus, buttons, palette-tools etc, have shown evidence that they create a fertile envir...
Mohammad M. Alsuraihi, Dimitris I. Rigas
ICIP
2009
IEEE
16 years 6 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...