Sciweavers

144 search results - page 19 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
MMM
2006
Springer
103views Multimedia» more  MMM 2006»
14 years 1 months ago
Multimedia and metadata watermarking driven by application constraints
Providing a fully functional multimedia DBMS (MMDBMS) becomes an emergency with the recent development of distributed environments. In this paper, we address the impact of using w...
Richard Chbeir, David Gross-Amblard
RECOMB
2007
Springer
14 years 7 months ago
A Bayesian Model That Links Microarray mRNA Measurements to Mass Spectrometry Protein Measurements
Abstract. An important problem in biology is to understand correspondences between mRNA microarray levels and mass spectrometry peptide counts. Recently, a compendium of mRNA expre...
Anitha Kannan, Andrew Emili, Brendan J. Frey
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 29 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
SIGGRAPH
1999
ACM
13 years 12 months ago
Teddy: A Sketching Interface for 3D Freeform Design
We present a sketching interface for quickly and easily designing freeform models such as stuffed animals and other rotund objects. The user draws several 2D freeform strokes inte...
Takeo Igarashi, Satoshi Matsuoka, Hidehiko Tanaka
DLOG
2008
13 years 10 months ago
Taming the Infinite Chase: Query Answering under Expressive Relational Constraints
Answering queries posed over knowledge bases is a central problem in knowledge representation and database theory. In databases, query containment is one of the important query op...
Andrea Calì, Georg Gottlob, Michael Kifer