Sciweavers

1356 search results - page 65 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2008
128views more  BMCBI 2008»
13 years 8 months ago
Efficient computation of absent words in genomic sequences
Background: Analysis of sequence composition is a routine task in genome research. Organisms are characterized by their base composition, dinucleotide relative abundance, codon us...
Julia Herold, Stefan Kurtz, Robert Giegerich
BMCBI
2010
175views more  BMCBI 2010»
13 years 8 months ago
Calibur: a tool for clustering large numbers of protein decoys
Background: Ab initio protein structure prediction methods generate numerous structural candidates, which are referred to as decoys. The decoy with the most number of neighbors of...
Shuai Cheng Li, Yen Kaow Ng
ICASSP
2011
IEEE
13 years 4 days ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu
ECIS
2004
13 years 9 months ago
Business alignment in the CRM domain: predicting CRM performance
In this paper we present a framework that aims to answer the central question why some organizations are successful in the CRM domain, while others are not. The framework is built...
Ronald Batenburg, Johan Versendaal
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 8 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...