Sciweavers

1356 search results - page 94 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SIGCSE
2002
ACM
118views Education» more  SIGCSE 2002»
13 years 8 months ago
A proposed undergraduate bioinformatics curriculum for computer scientists
Bioinformatics is a new and rapidly evolving discipline that has emerged from the fields of experimental molecular biology and biochemistry, and from the the artificial intelligen...
Travis E. Doom, Michael L. Raymer, Dan E. Krane, O...
JIB
2007
124views more  JIB 2007»
13 years 8 months ago
Analysis of integrated biomolecular networks using a generic network analysis suite
The informative value of biomolecular networks has shifted from being solely information resources for possible cellular partners (whether these embody proteins, (ribo)nucleic aci...
Matthias Oesterheld, Hans-Werner Mewes, Volker St&...
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
BMCBI
2006
94views more  BMCBI 2006»
13 years 8 months ago
Simulation of microarray data with realistic characteristics
Background: Microarray technologies have become common tools in biological research. As a result, a need for effective computational methods for data analysis has emerged. Numerou...
Matti Nykter, Tommi Aho, Miika Ahdesmäki, Pek...
SENSYS
2003
ACM
14 years 1 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...