Sciweavers

3999 search results - page 12 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
BMCBI
2008
114views more  BMCBI 2008»
13 years 8 months ago
Testing the Coulomb/Accessible Surface Area solvent model for protein stability, ligand binding, and protein design
Background: Protein structure prediction and computational protein design require efficient yet sufficiently accurate descriptions of aqueous solvent. We continue to evaluate the ...
Marcel Schmidt am Busch, Anne Lopes, Najette Amara...
TSE
1998
96views more  TSE 1998»
13 years 8 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
SIGMETRICS
2008
ACM
121views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems
Two schemes proposed to cope with unrecoverable or latent media errors and enhance the reliability of RAID systems are examined. The first scheme is the established, widely used d...
Ilias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos ...
IJCIM
2002
128views more  IJCIM 2002»
13 years 8 months ago
Web-based design and manufacturing systems for automobile components: architectures and usability studies
In this paper the architectures and usability issues of web-based software tools are discussed. For the development of automobile lighting components, various designers, developers...
Sung H. Ahn, Balaji Bharadwaj, Humayun Khalid, Shu...
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang