Sciweavers

19986 search results - page 3828 / 3998
» On Designing Software Architectures
Sort
View
145
Voted
CCS
2010
ACM
15 years 3 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
144
Voted
SOUPS
2010
ACM
15 years 3 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
15 years 3 months ago
Efficient waypoint tracking hybrid controllers for double integrators using classical time optimal control
This paper is a response to requests from several respected colleagues in academia for a careful writeup of the classical time-optimal control based hybrid controllers that we have...
Haitham A. Hindi, Lara S. Crawford, Rong Zhou, Cra...
131
Voted
BMCBI
2010
175views more  BMCBI 2010»
15 years 3 months ago
Calibur: a tool for clustering large numbers of protein decoys
Background: Ab initio protein structure prediction methods generate numerous structural candidates, which are referred to as decoys. The decoy with the most number of neighbors of...
Shuai Cheng Li, Yen Kaow Ng
125
Voted
BMCBI
2010
120views more  BMCBI 2010»
15 years 3 months ago
KiDoQ: using docking based energy scores to develop ligand based model for predicting antibacterials
Background: Identification of novel drug targets and their inhibitors is a major challenge in the field of drug designing and development. Diaminopimelic acid (DAP) pathway is a u...
Aarti Garg, Rupinder Tewari, Gajendra P. S. Raghav...
« Prev « First page 3828 / 3998 Last » Next »