Sciweavers

24529 search results - page 4891 / 4906
» Computing on Authenticated Data
Sort
View
SIGSOFT
2010
ACM
13 years 7 months ago
Growth of newcomer competence: challenges of globalization
The transfer of entire projects to offshore locations, the aging and renewal of core developers in legacy products, the recruiting in fast growing Internet companies, and the part...
Minghui Zhou, Audris Mockus
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
UIST
2010
ACM
13 years 7 months ago
Mixture model based label association techniques for web accessibility
An important aspect of making the Web accessible to blind users is ensuring that all important web page elements such as links, clickable buttons, and form fields have explicitly ...
Muhammad Asiful Islam, Yevgen Borodin, I. V. Ramak...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 7 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
BMCBI
2010
126views more  BMCBI 2010»
13 years 7 months ago
PETALS: Proteomic Evaluation and Topological Analysis of a mutated Locus' Signaling
Background: Colon cancer is driven by mutations in a number of genes, the most notorious of which is Apc. Though much of Apc's signaling has been mechanistically identified o...
Gürkan Bebek, Vishal Patel, Mark R. Chance
« Prev « First page 4891 / 4906 Last » Next »