Sciweavers

346 search results - page 17 / 70
» Can we trust docking results
Sort
View
IMC
2005
ACM
14 years 1 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
BMCBI
2010
95views more  BMCBI 2010»
13 years 7 months ago
Protein structure modelling and evaluation based on a 4-distance description of side-chain interactions
Background: Accurate evaluation and modelling of residue-residue interactions within and between proteins is a key aspect of computational structure prediction including homology ...
Vladimir Potapov, Mati Cohen, Yuval Inbar, Gideon ...
SE
2008
13 years 9 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 6 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
ACSAC
2007
IEEE
14 years 1 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...