Sciweavers

2016 search results - page 302 / 404
» Megamaps: Construction and Examples
Sort
View
TKDE
2008
122views more  TKDE 2008»
13 years 11 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
TOH
2008
98views more  TOH 2008»
13 years 11 months ago
Six-DoF Haptic Rendering of Contact Between Geometrically Complex Reduced Deformable Models
Real-time evaluation of distributed contact forces between rigid or deformable 3D objects is a key ingredient of 6-DoF force-feedback rendering. Unfortunately, at very high tempora...
Jernej Barbic, Doug L. James
JOC
2007
133views more  JOC 2007»
13 years 11 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
BMCBI
2004
83views more  BMCBI 2004»
13 years 11 months ago
VKCDB: Voltage-gated potassium channel database
Background: The family of voltage-gated potassium channels comprises a functionally diverse group of membrane proteins. They help maintain and regulate the potassium ion-based com...
Bin Li, Warren J. Gallin
BMCBI
2004
158views more  BMCBI 2004»
13 years 11 months ago
Improvement of alignment accuracy utilizing sequentially conserved motifs
Background: Multiple sequence alignment algorithms are very important tools in molecular biology today. Accurate alignment of proteins is central to several areas such as homology...
Saikat Chakrabarti, Nitin Bhardwaj, Prem A. Anand,...