Sciweavers

451 search results - page 76 / 91
» Identifying Facts for TCBR
Sort
View
IMSCCS
2006
IEEE
14 years 23 days ago
Degenerated Primer Design to Amplify the Heavy Chain Variable Region from Immunoglobulin cDNA
Background: The amplification of variable regions of immunoglobulins has become a major challenge in the cloning of antibody genes, whether from hybridoma cell lines or splenic B ...
Wang Ying, Chen Wei, Li Xu, Cheng Bing
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 22 days ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ETRA
2006
ACM
198views Biometrics» more  ETRA 2006»
14 years 21 days ago
Perceptual attention focus prediction for multiple viewers in case of multimedia perceptual compression with feedback delay
Human eyes have limited perception capabilities. Only 2 degrees of our 180 degree vision field provide the highest quality of perception. Due to this fact the idea of perceptual a...
Oleg Komogortsev, Javed I. Khan
ICSM
2005
IEEE
14 years 10 days ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
KBSE
2005
IEEE
14 years 9 days ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer