Sciweavers

6656 search results - page 1220 / 1332
» Change, Change, Change: Three Approaches
Sort
View
DEXAW
2010
IEEE
181views Database» more  DEXAW 2010»
13 years 10 months ago
Towards a Search System for the Web Exploiting Spatial Data of a Web Document
In this paper, we describe our work in progress in the scope of information retrieval exploiting the spatial data extracted from web documents. We discuss problems of a search for ...
Stefan Dlugolinsky, Michal Laclavik, Ladislav Hluc...
DIM
2008
ACM
13 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
CCS
2010
ACM
13 years 9 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
BMCBI
2010
141views more  BMCBI 2010»
13 years 9 months ago
BioPhysConnectoR: Connecting Sequence Information and Biophysical Models
Background: One of the most challenging aspects of biomolecular systems is the understanding of the coevolution in and among the molecule(s). A complete, theoretical picture of th...
Franziska Hoffgaard, Philipp Weil, Kay Hamacher
BMCBI
2010
163views more  BMCBI 2010»
13 years 9 months ago
Reduced representation of protein structure: implications on efficiency and scope of detection of structural similarity
Background: Computational comparison of two protein structures is the starting point of many methods that build on existing knowledge, such as structure modeling (including modeli...
Zong Hong Zhang, Hwee Kuan Lee, Ivana Mihalek
« Prev « First page 1220 / 1332 Last » Next »