Sciweavers

526 search results - page 47 / 106
» Increase honeypot security through data analysis
Sort
View
BMCBI
2010
105views more  BMCBI 2010»
15 years 4 months ago
Effects of scanning sensitivity and multiple scan algorithms on microarray data quality
Background: Maximizing the utility of DNA microarray data requires optimization of data acquisition through selection of an appropriate scanner setting. To increase the amount of ...
Andrew Williams, Errol M. Thomson
ISBI
2011
IEEE
14 years 8 months ago
Self-assessing image-based respiratory motion compensation for fluoroscopic coronary roadmapping
We present a self-assessing image-based motion compensation method for coronary roadmapping in fluoroscopic images. Extending our previous work on respiratory motion compensation...
Michael Manhart, Ying Zhu, Dime Vitanovski
NDSS
2008
IEEE
15 years 11 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
BMCBI
2010
164views more  BMCBI 2010»
15 years 4 months ago
Pan-genome sequence analysis using Panseq: an online tool for the rapid analysis of core and accessory genomic regions
Background: The pan-genome of a bacterial species consists of a core and an accessory gene pool. The accessory genome is thought to be an important source of genetic variability i...
Chad Laing, Cody Buchanan, Eduardo N. Taboada, Yon...
ISHPC
1999
Springer
15 years 9 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson