Sciweavers

97 search results - page 17 / 20
» Beyond Just Data Privacy
Sort
View
BMCBI
2006
111views more  BMCBI 2006»
13 years 8 months ago
Tools for integrated sequence-structure analysis with UCSF Chimera
Background: Comparing related structures and viewing the structures in the context of sequence alignments are important tasks in protein structure-function research. While many pr...
Elaine C. Meng, Eric F. Pettersen, Gregory S. Couc...
CCS
2010
ACM
13 years 8 months ago
Dissecting one click frauds
"One Click Fraud" is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of polic...
Nicolas Christin, Sally S. Yanagihara, Keisuke Kam...
IADIS
2003
13 years 9 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
CCS
2010
ACM
13 years 8 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
STORAGESS
2005
ACM
14 years 1 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...