Sciweavers

756 search results - page 145 / 152
» The role data model revisited
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 19 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
VRML
1998
ACM
14 years 18 days ago
The Peloton Bicycling Simulator
Peloton is a sports simulator that uses the Virtual Reality Modeling Language (VRML) to create virtual environments for athletic training and competition. In particular, it create...
Gianpaolo U. Carraro, Mauricio Cortes, John T. Edm...
IADIS
2004
13 years 9 months ago
A Study on Mobile Game Adoption Under HPI(High-Speed Portable Internet) Environment
Mobile game is considered as one of the emerging mobile services in recent years. A number of mobile game companies have been established and on-line game providers have also atte...
Young Seog Yoon, Im Sook Há, Mun Kee Choi
BMCBI
2010
159views more  BMCBI 2010»
13 years 8 months ago
Predicting domain-domain interaction based on domain profiles with feature selection and support vector machines
Background: Protein-protein interaction (PPI) plays essential roles in cellular functions. The cost, time and other limitations associated with the current experimental methods ha...
Alvaro J. González, Li Liao
BMCBI
2007
103views more  BMCBI 2007»
13 years 8 months ago
Dynamic simulation of regulatory networks using SQUAD
Background: The ambition of most molecular biologists is the understanding of the intricate network of molecular interactions that control biological systems. As scientists uncove...
Alessandro Di Cara, Abhishek Garg, Giovanni De Mic...