Sciweavers

1356 search results - page 176 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2006
137views more  BMCBI 2006»
13 years 8 months ago
GOPET: A tool for automated predictions of Gene Ontology terms
Background: Vast progress in sequencing projects has called for annotation on a large scale. A Number of methods have been developed to address this challenging task. These method...
Arunachalam Vinayagam, Coral del Val, Falk Schuber...
IPPS
2005
IEEE
14 years 1 months ago
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
1 Electronic fair-exchange protocols have received significant attention from the research community in the recent past. In loose terms, the fair exchange problem is defined as at...
Mudhakar Srivatsa, Li Xiong, Ling Liu
WPES
2006
ACM
14 years 2 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
ENVSOFT
2006
131views more  ENVSOFT 2006»
13 years 8 months ago
Hydrological models are so good, do we still need data?
Our ability to numerically model natural systems has progressed enormously over the last 10e20 years. During the last decade computational power has increased to the stage where w...
R. P. Silberstein
CEC
2005
IEEE
14 years 1 months ago
Multiobjective clustering around medoids
Abstract- The large majority of existing clustering algorithms are centered around the notion of a feature, that is, individual data items are represented by their intrinsic proper...
Julia Handl, Joshua D. Knowles