Sciweavers

341 search results - page 67 / 69
» Discovering Patterns of Change Types
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
CN
2006
124views more  CN 2006»
13 years 7 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
BMCBI
2005
82views more  BMCBI 2005»
13 years 7 months ago
Quality assessment of microarrays: Visualization of spatial artifacts and quantitation of regional biases
Background: Quality-control is an important issue in the analysis of gene expression microarrays. One type of problem is regional bias, in which one region of a chip shows artifac...
Mark Reimers, John N. Weinstein
BMCBI
2010
259views more  BMCBI 2010»
13 years 2 months ago
Rule-based spatial modeling with diffusing, geometrically constrained molecules
Background: We suggest a new type of modeling approach for the coarse grained, particle-based spatial simulation of combinatorially complex chemical reaction systems. In our appro...
Gerd Gruenert, Bashar Ibrahim, Thorsten Lenser, Ma...
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton