Sciweavers

17164 search results - page 3425 / 3433
» Applications of Sensor Networks
Sort
View
131
Voted
GI
2009
Springer
15 years 9 days ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
148
Voted
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
15 years 8 days ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
151
Voted
AVI
2010
14 years 12 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
BMCBI
2010
183views more  BMCBI 2010»
14 years 12 months ago
The complexity of gene expression dynamics revealed by permutation entropy
Background: High complexity is considered a hallmark of living systems. Here we investigate the complexity of temporal gene expression patterns using the concept of Permutation En...
Xiaoliang Sun, Yong Zou, Victoria J. Nikiforova, J...
BMCBI
2010
161views more  BMCBI 2010»
14 years 12 months ago
LTC: a novel algorithm to improve the efficiency of contig assembly for physical mapping in complex genomes
Background: Physical maps are the substrate of genome sequencing and map-based cloning and their construction relies on the accurate assembly of BAC clones into large contigs that...
Zeev Frenkel, Etienne Paux, David I. Mester, Cathe...
« Prev « First page 3425 / 3433 Last » Next »