Sciweavers

986 search results - page 69 / 198
» Protecting the Intranet Against
Sort
View
IDA
2003
Springer
14 years 2 months ago
Large Scale Mining of Molecular Fragments with Wildcards
The main task of drug discovery is to find novel bioactive molecules, i.e., chemical compounds that, for example, protect human cells against a virus. One way to support solving t...
Heiko Hofer, Christian Borgelt, Michael R. Berthol...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
GI
2007
Springer
14 years 1 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch
FC
2006
Springer
96views Cryptology» more  FC 2006»
14 years 27 days ago
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the identities of these users. We discover that current s...
Adam Barth, Dan Boneh, Brent Waters
RECOSOC
2007
160views Hardware» more  RECOSOC 2007»
13 years 10 months ago
Stack processor architecture and development methods suitable for dependable applications
Nowadays, reconfigurable and multiprocessor systems are becoming increasingly attractive for many applications. Such systems should be more and more dependable especially if error...
Mehdi Jallouli, Camille Diou, Fabrice Monteiro