Sciweavers

526 search results - page 86 / 106
» Increase honeypot security through data analysis
Sort
View
BMCBI
2010
100views more  BMCBI 2010»
15 years 4 months ago
Scaffold filling, contig fusion and comparative gene order inference
Background: There has been a trend in increasing the phylogenetic scope of genome sequencing without finishing the sequence of the genome. Increasing numbers of genomes are being ...
Adriana Muñoz, Chunfang Zheng, Qian Zhu, Vi...
BMCBI
2005
133views more  BMCBI 2005»
15 years 4 months ago
Systematic determination of the mosaic structure of bacterial genomes: species backbone versus strain-specific loops
Background: Public databases now contain multitude of complete bacterial genomes, including several genomes of the same species. The available data offers new opportunities to add...
Hélène Chiapello, I. Bourgait, F. So...
TIFS
2008
148views more  TIFS 2008»
15 years 4 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
MSWIM
2005
ACM
15 years 10 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
ICDCS
2007
IEEE
15 years 11 months ago
STEP: Sequentiality and Thrashing Detection Based Prefetching to Improve Performance of Networked Storage Servers
State-of-the-art networked storage servers are equipped with increasingly powerful computing capability and large DRAM memory as storage caches. However, their contribution to the...
Shuang Liang, Song Jiang, Xiaodong Zhang