Sciweavers

346 search results - page 30 / 70
» Can we trust docking results
Sort
View
POLICY
2004
Springer
14 years 29 days ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ICWS
2004
IEEE
13 years 9 months ago
Anonymizing Web Services through a Club Mechanism with Economic Incentives
Preserving privacy during Web transactions is a major concern for individuals and organizations. One of the solutions proposed in the literature is to maintain anonymity through gr...
Mamata Jenamani, Leszek Lilien, Bharat K. Bhargava
BMCBI
2005
108views more  BMCBI 2005»
13 years 7 months ago
The modeled structure of the RNA dependent RNA polymerase of GBV-C Virus suggests a role for motif E in Flaviviridae RNA polymer
Background: The Flaviviridae virus family includes major human and animal pathogens. The RNA dependent RNA polymerase (RdRp) plays a central role in the replication process, and t...
François Ferron, Cécile Bussetta, H&...
CONCURRENCY
2007
60views more  CONCURRENCY 2007»
13 years 7 months ago
Relative autonomous accounting for peer-to-peer Grids
We here present and evaluate relative accounting, an autonomous accounting scheme that provides accurate results even when the parties (consumer and provider) do not trust each ot...
Robson Santos, Alisson Andrade, Walfredo Cirne, Fr...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini