Sciweavers

1625 search results - page 177 / 325
» Privacy-preserving data publishing
Sort
View
JCB
2007
99views more  JCB 2007»
15 years 4 months ago
Duplication and Inversion History of a Tandemly Repeated Genes Family
Given a phylogenetic tree for a family of tandemly repeated genes and their signed order on the chromosome, we aim to find the minimum number of inversions compatible with an evo...
Mathieu Lajoie, Denis Bertrand, Nadia El-Mabrouk, ...
KBS
2007
76views more  KBS 2007»
15 years 4 months ago
What middleware for network centric operations?
The main intent of this paper is to address the issue of middleware in network centric operations. To this end, we characterize a set of Information Technology capabilities that s...
Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mou...
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 4 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
PR
2000
166views more  PR 2000»
15 years 4 months ago
A window-based inverse Hough transform
In this paper a new Hough transform inversion technique is proposed. It is a window-based inverse Hough transform algorithm, which reconstructs the original image using only the d...
Anastasios L. Kesidis, Nikos Papamarkos
ISJ
2002
212views more  ISJ 2002»
15 years 4 months ago
Assessing and managing the benefits of enterprise systems: the business manager's perspective
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in ...
Shari Shang, Peter B. Seddon