Sciweavers

346 search results - page 25 / 70
» Can we trust docking results
Sort
View
EDBTW
2004
Springer
14 years 1 months ago
SPROUT: P2P Routing with Social Networks
In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links. We present a trust model t...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
SEC
2007
13 years 9 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
TRUST
2010
Springer
14 years 20 days ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
BMCBI
2008
134views more  BMCBI 2008»
13 years 7 months ago
Prediction of protein-protein binding site by using core interface residue and support vector machine
Background: The prediction of protein-protein binding site can provide structural annotation to the protein interaction data from proteomics studies. This is very important for th...
Nan Li, Zhonghua Sun, Fan Jiang
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
14 years 2 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...