Sciweavers

384 search results - page 76 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
BMCBI
2008
72views more  BMCBI 2008»
13 years 9 months ago
HECTAR: A method to predict subcellular targeting in heterokonts
Background: The heterokonts are a particularly interesting group of eukaryotic organisms; they include many key species of planktonic and coastal algae and several important patho...
Bernhard Gschloessl, Yann Guermeur, J. Mark Cock
BMCBI
2006
142views more  BMCBI 2006»
13 years 9 months ago
Improving the Performance of SVM-RFE to Select Genes in Microarray Data
Background: Recursive Feature Elimination is a common and well-studied method for reducing the number of attributes used for further analysis or development of prediction models. ...
Yuanyuan Ding, Dawn Wilkins
IJCSA
2007
130views more  IJCSA 2007»
13 years 9 months ago
Purposeful Deployment via Self-Organizing Flocking Coalition in Sensor Networks
This paper presents a deployment strategy via self organizing flocking coalitions for mobile sensor network coverage. The concepts of our approach are inspired by the flocking phe...
Yee Ming Chen, Shu-Hao Chang
MTA
2000
165views more  MTA 2000»
13 years 8 months ago
Approximating Content-Based Object-Level Image Retrieval
Object-level image retrieval is an active area of research. Given an image, a human observerdoesnot see randomdots of colors. Rather,he she observesfamiliarobjectsin the image. The...
Wynne Hsu, Tat-Seng Chua, Hung Keng Pung
ACSAC
2010
IEEE
13 years 7 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...