Sciweavers

5722 search results - page 9 / 1145
» Security Function Interactions
Sort
View
BMCBI
2008
123views more  BMCBI 2008»
13 years 8 months ago
Functional module detection by functional flow pattern mining in protein interaction networks
eraction networks. In this abstract, we extend this approach by mining functional flow patterns for the purpose of detecting small-sized modules for specific functions. Methods Our...
Young-Rae Cho, Lei Shi, Aidong Zhang
NAR
2006
125views more  NAR 2006»
13 years 8 months ago
Phytophthora functional genomics database (PFGD): functional genomics of phytophthora-plant interactions
10 The Phytophthora Functional Genomics Database (PFGD; http://www.pfgd.org), developed by the National Center for Genome Resources in collaboration with The Ohio State University...
Kamal Gajendran, Michael D. Gonzales, Andrew D. Fa...
EUROCRYPT
2008
Springer
13 years 10 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CHI
2008
ACM
14 years 9 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...