Sciweavers

1356 search results - page 119 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2010
151views more  BMCBI 2010»
13 years 8 months ago
TF-finder: A software package for identifying transcription factors involved in biological processes using microarray data and e
Background: Identification of transcription factors (TFs) involved in a biological process is the first step towards a better understanding of the underlying regulatory mechanisms...
Xiaoqi Cui, Tong Wang, Huann-Sheng Chen, Victor Bu...
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
13 years 9 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
14 years 1 months ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
DSOM
1999
Springer
14 years 16 days ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
ESORICS
2012
Springer
11 years 10 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...