Sciweavers

1818 search results - page 293 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
127
Voted
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
FUNGAMES
2010
15 years 4 months ago
ajME: making game engines autonomic
Autonomic Computing is now showing its value as a solution to the increased complexities of maintaining computer systems and has been applied to many different fields. In this pap...
Pedro Martins, Julie A. McCann
109
Voted
BMCBI
2007
128views more  BMCBI 2007»
15 years 3 months ago
Absolute estimation of initial concentrations of amplicon in a real-time RT-PCR process
Background: Since real time PCR was first developed, several approaches to estimating the initial quantity of template in an RT-PCR reaction have been tried. While initially only ...
Marjo V. Smith, Chris R. Miller, Michael Kohn, Nig...
146
Voted
BMCBI
2008
111views more  BMCBI 2008»
15 years 3 months ago
SciDBMaker: new software for computer-aided design of specialized biological databases
Background: The exponential growth of research in molecular biology has brought concomitant proliferation of databases for stocking its findings. A variety of protein sequence dat...
Riadh Hammami, Abdelmajid Zouhir, Karim Naghmouchi...
133
Voted
BMCBI
2008
98views more  BMCBI 2008»
15 years 3 months ago
MTAP: The Motif Tool Assessment Platform
Background: In recent years, substantial effort has been applied to de novo regulatory motif discovery. At this time, more than 150 software tools exist to detect regulatory bindi...
Daniel Quest, Kathryn Dempsey, Mohammad Shafiullah...