Sciweavers

334 search results - page 34 / 67
» Survey of trust models in different network domains
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
AINA
2007
IEEE
14 years 2 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
CSREAEEE
2006
88views Business» more  CSREAEEE 2006»
13 years 9 months ago
Documentation Tool: An Object Oriented Model for Electronic Library Management
This work is in the domain of Electronic Document Management (EDM) [1]. The documents can be an electronic writing, an image, a sound file, a network protocol message, a set of da...
Saad Harous, Djamila Mechta, Mahieddine Djoudi
BMCBI
2005
122views more  BMCBI 2005»
13 years 7 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
RECOMB
2003
Springer
14 years 8 months ago
An integrated probabilistic model for functional prediction of proteins
We develop an integrated probabilistic model to combine protein physical interactions, genetic interactions, highly correlated gene expression network, protein complex data, and d...
Minghua Deng, Ting Chen, Fengzhu Sun