Sciweavers

18924 search results - page 60 / 3785
» Conformance of Distributed Systems
Sort
View
162
Voted
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 4 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
116
Voted
HCI
2009
15 years 10 days ago
Agent-Based Driver Abnormality Estimation
For enhancing current driver assistance and information systems with regard to the capability to recognize an individual driver's needs, we conceive a system based on fuzzy lo...
Tony Poitschke, Florian Laquai, Gerhard Rigoll
96
Voted
BMCBI
2008
102views more  BMCBI 2008»
15 years 2 months ago
Stability of the core domain of p53: insights from computer simulations
: The tumour suppressor protein p53 protein has a core domain that binds DNA and is the site for most oncogenic mutations. This domain is quite unstable compared to its homologs p...
Arumugam Madhumalar, Derek John Smith, Chandra Ver...