Sciweavers

1018 search results - page 146 / 204
» Remote User Authentication Using Public Information
Sort
View
GIS
2008
ACM
13 years 9 months ago
Similarity-based prediction of travel times for vehicles traveling on known routes
The use of centralized, real-time position tracking is proliferating in the areas of logistics and public transportation. Real-time positions can be used to provide up-to-date inf...
Dalia Tiesyte, Christian S. Jensen
BMCBI
2004
98views more  BMCBI 2004»
13 years 7 months ago
Incidence of "quasi-ditags" in catalogs generated by Serial Analysis of Gene Expression (SAGE)
Background: Serial Analysis of Gene Expression (SAGE) is a functional genomic technique that quantitatively analyzes the cellular transcriptome. The analysis of SAGE libraries rel...
Sergey V. Anisimov, Alexei A. Sharov
DOCENG
2011
ACM
12 years 7 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
NSDI
2008
13 years 10 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
VISUALIZATION
1999
IEEE
14 years 6 days ago
Image Graphs - A Novel Approach to Visual Data Exploration
For types of data visualization where the cost of producing images is high, and the relationship between the rendering parameters and the image produced is less than obvious, a vi...
Kwan-Liu Ma