Sciweavers

1356 search results - page 268 / 272
» The ideal of verified software
Sort
View
AES
2008
Springer
182views Cryptology» more  AES 2008»
13 years 11 months ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat
BMCBI
2010
120views more  BMCBI 2010»
13 years 11 months ago
KiDoQ: using docking based energy scores to develop ligand based model for predicting antibacterials
Background: Identification of novel drug targets and their inhibitors is a major challenge in the field of drug designing and development. Diaminopimelic acid (DAP) pathway is a u...
Aarti Garg, Rupinder Tewari, Gajendra P. S. Raghav...
BMCBI
2007
124views more  BMCBI 2007»
13 years 11 months ago
Analysis on multi-domain cooperation for predicting protein-protein interactions
Background: Domains are the basic functional units of proteins. It is believed that protein-protein interactions are realized through domain interactions. Revealing multi-domain c...
Rui-Sheng Wang, Yong Wang, Ling-Yun Wu, Xiang-Sun ...
JOT
2006
80views more  JOT 2006»
13 years 10 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
IEEESP
2007
98views more  IEEESP 2007»
13 years 10 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher