Sciweavers

2261 search results - page 446 / 453
» Dynamic types for authentication
Sort
View
KBS
2010
106views more  KBS 2010»
15 years 28 days ago
A semantic backend for content management systems
The users of a content repository express the semantics they have in mind while defining the content items and their properties, and forming them into a particular hierarchy. How...
Gokce Laleci, Gunes Aluc, Asuman Dogac, A. Sinaci,...
RAID
2010
Springer
15 years 27 days ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
RECOMB
2010
Springer
15 years 27 days ago
Predicting Nucleosome Positioning Using Multiple Evidence Tracks
Abstract. We describe a probabilistic model, implemented as a dynamic Bayesian network, that can be used to predict nucleosome positioning along a chromosome based on one or more g...
Sheila M. Reynolds, Zhiping Weng, Jeff A. Bilmes, ...
168
Voted
FPL
2010
Springer
188views Hardware» more  FPL 2010»
15 years 15 days ago
SeqHive: A Reconfigurable Computer Cluster for Genome Re-sequencing
We demonstrate how Field Programmable Gate Arrays (FPGAs) may be used to address the computing challenges associated with assembling genome sequences from recent ultra-high-through...
Kristian Stevens, Henry Chen, Terry Filiba, Peter ...
153
Voted
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
15 years 14 days ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec