Sciweavers

388 search results - page 55 / 78
» Quantifying Similarities Between Timed Systems
Sort
View
BMCBI
2005
125views more  BMCBI 2005»
13 years 8 months ago
Query3d: a new method for high-throughput analysis of functional residues in protein structures
Background: The identification of local similarities between two protein structures can provide clues of a common function. Many different methods exist for searching for similar ...
Gabriele Ausiello, Allegra Via, Manuela Helmer-Cit...
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ISEMANTICS
2010
13 years 10 months ago
Foundations of data interoperability on the web: a web science perspective
In this paper, when we use the term ontology, we are primarily referring to linked data in the form of RDF(S). The problem of ontology mapping has attracted considerable attention...
Hamid Haidarian Shahri
IANDC
2006
77views more  IANDC 2006»
13 years 8 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
DSN
2009
IEEE
14 years 3 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...