Sciweavers

519 search results - page 84 / 104
» Enhancing information systems security in an academic organi...
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 2 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
CIKM
2008
Springer
13 years 10 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
NAR
2010
123views more  NAR 2010»
13 years 2 months ago
Xenbase: gene expression and improved integration
Xenbase (www.xenbase.org), the model organism database for Xenopus laevis and X. (Silurana) tropicalis, is the principal centralized resource of genomic, development data and comm...
Jeff B. Bowes, Kevin A. Snyder, Erik Segerdell, Ch...
OTM
2007
Springer
14 years 2 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
SP
2002
IEEE
13 years 7 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...