Sciweavers

5398 search results - page 1017 / 1080
» On the Effective Use of Software Standards in Systems Integr...
Sort
View
ESORICS
2012
Springer
11 years 11 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
WWW
2007
ACM
14 years 9 months ago
A large-scale evaluation and analysis of personalized search strategies
Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistent...
Zhicheng Dou, Ruihua Song, Ji-Rong Wen
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
DOCENG
2006
ACM
14 years 3 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
BMCBI
2006
374views more  BMCBI 2006»
13 years 9 months ago
AMDA: an R package for the automated microarray data analysis
Background: Microarrays are routinely used to assess mRNA transcript levels on a genome-wide scale. Large amount of microarray datasets are now available in several databases, and...
Mattia Pelizzola, Norman Pavelka, Maria Foti, Paol...
« Prev « First page 1017 / 1080 Last » Next »