Sciweavers

1893 search results - page 201 / 379
» Computational composites
Sort
View
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
14 years 5 months ago
Predicting Protective Linear B-Cell Epitopes Using Evolutionary Information
Mapping B-cell epitopes plays an important role in vaccine design, immunodiagnostic tests, and antibody production. Because the experimental determination of B-cell epitopes is ti...
Yasser El-Manzalawy, Drena Dobbs, Vasant Honavar
CCS
2007
ACM
14 years 5 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
ESORICS
2007
Springer
14 years 5 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
HRI
2006
ACM
14 years 4 months ago
Attaining situational awareness for sliding autonomy
We are interested in the problems of a human operator who is responsible for rapidly and accurately responding to requests for help from an autonomous robotic construction team. A...
Brennan Sellner, Laura M. Hiatt, Reid G. Simmons, ...
WWW
2006
ACM
14 years 4 months ago
ASDL: a wide spectrum language for designing web services
A Service oriented system emerges from composition of services. Dynamically composed reactive Web services form a special class of service oriented system, where the delays associ...
Monika Solanki, Antonio Cau, Hussein Zedan