Sciweavers

15379 search results - page 78 / 3076
» Protecting users from
Sort
View
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Predicting Protective Linear B-Cell Epitopes Using Evolutionary Information
Mapping B-cell epitopes plays an important role in vaccine design, immunodiagnostic tests, and antibody production. Because the experimental determination of B-cell epitopes is ti...
Yasser El-Manzalawy, Drena Dobbs, Vasant Honavar
DSN
2007
IEEE
14 years 2 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
IPCCC
2007
IEEE
14 years 2 months ago
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major c...
Toby Xu, Ymg Cai
SEC
2008
13 years 9 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
ICIP
2000
IEEE
14 years 9 months ago
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Cormac Herley