Sciweavers

2386 search results - page 446 / 478
» Database Security 2000
Sort
View
112
Voted
NAR
2000
117views more  NAR 2000»
15 years 2 months ago
The tmRNA Website
tmRNA (also known as 10Sa RNA) is so-named for its dual tRNA-like and mRNA-like nature. It is employed in a remarkable trans-translation process to add a Cterminal peptide tag to ...
Kelly P. Williams
104
Voted
PRL
2000
104views more  PRL 2000»
15 years 2 months ago
PicSOM - content-based image retrieval with self-organizing maps
We have developed a novel system for content-based image retrieval in large, unannotated databases. The system is called PicSOM, and it is based on tree structured self-organizing...
Jorma Laaksonen, Markus Koskela, Sami Laakso, Erkk...
150
Voted
ICASSP
2011
IEEE
14 years 6 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
WWW
2009
ACM
16 years 3 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
124
Voted
WWW
2003
ACM
16 years 3 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...