Sciweavers

5722 search results - page 1080 / 1145
» Security Function Interactions
Sort
View
ICGA
1997
122views Optimization» more  ICGA 1997»
13 years 11 months ago
A Comparison of Global and Local Search Methods in Drug Docking
Molecular docking software makes computational predictions of the interaction of molecules. This can be useful, for example, in evaluating the binding of candidate drug molecules ...
Christopher D. Rosin, R. Scott Halliday, William E...
QNS
1996
13 years 11 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
GPCE
2008
Springer
13 years 11 months ago
Property models: from incidental algorithms to reusable components
A user interface, such as a dialog, assists a user in synthesising a set of values, typically parameters for a command object. Code for “command parameter synthesis” is usuall...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...
ERCIMDL
2010
Springer
132views Education» more  ERCIMDL 2010»
13 years 10 months ago
A Visual Digital Library Approach for Time-Oriented Scientific Primary Data
Abstract. Digital Library support for textual and certain types of nontextual documents has significantly advanced over the last years. While Digital Library support implies many a...
Jürgen Bernard, Jan Brase, Dieter W. Fellner,...
« Prev « First page 1080 / 1145 Last » Next »