Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protein-Protein Interfaces: Recognition of Similar Spatial and Chemical Organizations., , , and . WABI, volume 3240 of Lecture Notes in Computer Science, page 194-205. Springer, (2004)Towards Federation and Interoperability of Cloud Storage Systems., , , , and . Data Intensive Storage Services for Cloud Environments, IGI Global, (2013)Side Channels in Cloud Services: Deduplication in Cloud Storage., , and . IEEE Secur. Priv., 8 (6): 40-47 (2010)RsiteDB: a database of protein binding pockets that interact with RNA nucleotide bases., , and . Nucleic Acids Res., 37 (Database-Issue): 369-373 (2009)The Multiple Common Point Set Problem and Its Application to Molecule Binding Pattern Detection., , , and . J. Comput. Biol., 13 (2): 407-428 (2006)MultiBind and MAPPIS: webservers for multiple alignment of protein 3D-binding sites and their interactions., , , and . Nucleic Acids Res., 36 (Web-Server-Issue): 260-264 (2008)Delegation across storage clouds: on-boarding federation as a case study., , , , , and . Scalable Comput. Pract. Exp., (2013)Algorithms for the detection and prediction of 3D protein binding patterns and interactions. Tel Aviv University, Israel, (2008)Tel Aviv University Library.Security intelligence for cloud management infrastructures., , , , , , , , and . IBM J. Res. Dev., 60 (4): 11 (2016)Analysis and Mitigation of NoSQL Injections., , and . IEEE Secur. Priv., 14 (2): 30-39 (2016)