Sciweavers

507 search results - page 79 / 102
» Defensive Marketing Strategies
Sort
View
BMCBI
2008
125views more  BMCBI 2008»
13 years 9 months ago
Tandem duplication, circular permutation, molecular adaptation: how Solanaceae resist pests via inhibitors
Background: The Potato type II (Pot II) family of proteinase inhibitors plays critical roles in the defense system of plants from Solanaceae family against pests. To better unders...
Lesheng Kong, Shoba Ranganathan
CSL
2006
Springer
13 years 9 months ago
Support vector machines for speaker and language recognition
Support vector machines (SVMs) have proven to be a powerful technique for pattern classification. SVMs map inputs into a high dimensional space and then separate classes with a hy...
William M. Campbell, Joseph P. Campbell, Douglas A...
CN
2007
137views more  CN 2007»
13 years 9 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
ISI
2006
Springer
13 years 9 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
ACSAC
2010
IEEE
13 years 7 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou