Sciweavers

259 search results - page 47 / 52
» Workflow Exception Patterns
Sort
View
ISPEC
2011
Springer
12 years 11 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
ER
1999
Springer
196views Database» more  ER 1999»
14 years 29 days ago
A Process-Integrated Conceptual Design Environment for Chemical Engineering
Abstract. The process industries (chemicals, food, oil, ...) are characterized by - continuous or batch -- processes of material transformation. The design of such processes, and t...
Matthias Jarke, Thomas List, Klaus Weidenhaupt
BMCBI
2010
153views more  BMCBI 2010»
13 years 8 months ago
Starr: Simple Tiling ARRay analysis of Affymetrix ChIP-chip data
Background: Chromatin immunoprecipitation combined with DNA microarrays (ChIP-chip) is an assay used for investigating DNA-protein-binding or post-translational chromatin/histone ...
Benedikt Zacher, Pei Fen Kuan, Achim Tresch
BMCBI
2010
125views more  BMCBI 2010»
13 years 8 months ago
Visualisation tool for peptide fractionation data in proteomics: application to OFFGEL isoelectric focussing
Background: OFFGEL isoelectric focussing (IEF) has become a popular tool in proteomics to fractionate peptides or proteins. As a consequence there is a need for software solutions...
David-Olivier D. Azulay, Hendrik Neubert, Mireia F...