Sciweavers

1356 search results - page 24 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ISBI
2004
IEEE
14 years 8 months ago
Grid-Enabled Automatic Construction of A Two-Chamber Cardiac PDM from a Large Database of Dynamic 3D Shapes
Point Distribution Modelling (PDM) is an efficient generative technique that can be used to incorporate statistical shape priors into image analysis methods like Active Shape Mode...
Alejandro F. Frangi, Loic Boisrobert, Marcos Lauce...
COMPUTER
1999
108views more  COMPUTER 1999»
13 years 7 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
BMCBI
2008
143views more  BMCBI 2008»
13 years 8 months ago
Gene identification and protein classification in microbial metagenomic sequence data via incremental clustering
Background: The identification and study of proteins from metagenomic datasets can shed light on the roles and interactions of the source organisms in their communities. However, ...
Shibu Yooseph, Weizhong Li, Granger G. Sutton
ACSAC
2010
IEEE
12 years 11 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo