Sciweavers

672 search results - page 121 / 135
» An assessment of tag presentation techniques
Sort
View
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
DRM
2005
Springer
14 years 1 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
BIBE
2003
IEEE
133views Bioinformatics» more  BIBE 2003»
14 years 29 days ago
A Computational Pipeline for Protein Structure Prediction and Analysis at Genome Scale
The tertiary (3D) structure of a protein contains the essential information for understanding the biological function of the protein at the molecular and cellular levels. Traditio...
Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyl...
BMCBI
2006
178views more  BMCBI 2006»
13 years 7 months ago
Correlation analysis of two-dimensional gel electrophoretic protein patterns and biological variables
Background: Two-dimensional gel electrophoresis (2DE) is a powerful technique to examine post-translational modifications of complexly modulated proteins. Currently, spot detectio...
Werner W. V. B. Van Belle, Nina N. A. Anensen, Ing...
BMCBI
2005
116views more  BMCBI 2005»
13 years 7 months ago
Can Zipf's law be adapted to normalize microarrays?
Background: Normalization is the process of removing non-biological sources of variation between array experiments. Recent investigations of data in gene expression databases for ...
Timothy Lu, Christine M. Costello, Peter J. P. Cro...