Sciweavers

1058 search results - page 210 / 212
» It's Doomed; We Can Prove It
Sort
View
CHI
1999
ACM
14 years 2 months ago
A Better Mythology for System Design
The past decades have seen huge improvements in computer systems but these have proved difficult to translate into comparable improvements in the usability and social integration)...
Jed Harris, D. Austin Henderson Jr.
ICB
2007
Springer
183views Biometrics» more  ICB 2007»
14 years 1 months ago
Robust Point-Based Feature Fingerprint Segmentation Algorithm
Abstract. A critical step in automatic fingerprint recognition is the accurate segmentation of fingerprint images. The objective of fingerprint segmentation is to decide which part...
Chaohong Wu, Sergey Tulyakov, Venu Govindaraju
ACSAC
2004
IEEE
14 years 1 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
BMCBI
2010
92views more  BMCBI 2010»
13 years 10 months ago
HORI: a web server to compute Higher Order Residue Interactions in protein structures
Background: Folding of a protein into its three dimensional structure is influenced by both local and global interactions within a protein. Higher order residue interactions, like...
Pandurangan Sundaramurthy, Khader Shameer, Raashi ...
BMCBI
2007
116views more  BMCBI 2007»
13 years 10 months ago
Ranked Adjusted Rand: integrating distance and partition information in a measure of clustering agreement
Background: Biological information is commonly used to cluster or classify entities of interest such as genes, conditions, species or samples. However, different sources of data c...
Francisco R. Pinto, João A. Carriço,...