Sciweavers

284 search results - page 55 / 57
» Modularity of Completeness Revisited
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2008
141views more  BMCBI 2008»
13 years 8 months ago
Discovering functional interaction patterns in protein-protein interaction networks
Background: In recent years, a considerable amount of research effort has been directed to the analysis of biological networks with the availability of genome-scale networks of ge...
Mehmet E. Turanalp, Tolga Can
BMCBI
2008
204views more  BMCBI 2008»
13 years 8 months ago
EST2uni: an open, parallel tool for automated EST analysis and database creation, with a data mining web interface and microarra
Background: Expressed sequence tag (EST) collections are composed of a high number of single-pass, redundant, partial sequences, which need to be processed, clustered, and annotat...
Javier Forment, Francisco Gilabert Villamón...
BMCBI
2008
110views more  BMCBI 2008»
13 years 8 months ago
Predikin and PredikinDB: a computational framework for the prediction of protein kinase peptide specificity and an associated da
Background: We have previously described an approach to predicting the substrate specificity of serine-threonine protein kinases. The method, named Predikin, identifies key conser...
Neil F. W. Saunders, Ross I. Brinkworth, Thomas Hu...
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 8 months ago
Cut-Elimination and Proof Search for Bi-Intuitionistic Tense Logic
We consider an extension of bi-intuitionistic logic with the traditional modalities , , and from tense logic Kt. Proof theoretically, this extension is obtained simply by extendin...
Rajeev Goré, Linda Postniece, Alwen Tiu