Sciweavers

2386 search results - page 446 / 478
» Database Security 2000
Sort
View
NAR
2000
117views more  NAR 2000»
13 years 9 months ago
The tmRNA Website
tmRNA (also known as 10Sa RNA) is so-named for its dual tRNA-like and mRNA-like nature. It is employed in a remarkable trans-translation process to add a Cterminal peptide tag to ...
Kelly P. Williams
PRL
2000
104views more  PRL 2000»
13 years 9 months ago
PicSOM - content-based image retrieval with self-organizing maps
We have developed a novel system for content-based image retrieval in large, unannotated databases. The system is called PicSOM, and it is based on tree structured self-organizing...
Jorma Laaksonen, Markus Koskela, Sami Laakso, Erkk...
ICASSP
2011
IEEE
13 years 1 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
WWW
2009
ACM
14 years 10 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
WWW
2003
ACM
14 years 10 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...