Sciweavers

1281 search results - page 230 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
SIGCOMM
2010
ACM
13 years 8 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
MKWI
2008
246views Business» more  MKWI 2008»
13 years 10 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
AIS
2004
Springer
14 years 1 months ago
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval
This project implements an integrated biological information website that classifies technical documents, learns about users' interests, and offers intuitive interactive visua...
Min Hong, Anis Kairmpour-fard, Steve Russell, Lawr...
BMCBI
2008
120views more  BMCBI 2008»
13 years 8 months ago
DBMLoc: a Database of proteins with multiple subcellular localizations
Background: Subcellular localization information is one of the key features to protein function research. Locating to a specific subcellular compartment is essential for a protein...
Song Zhang, Xuefeng Xia, Jincheng Shen, Yun Zhou, ...