Sciweavers

1018 search results - page 178 / 204
» Remote User Authentication Using Public Information
Sort
View
BMCBI
2006
146views more  BMCBI 2006»
15 years 2 months ago
GeneTools - application for functional annotation and statistical hypothesis testing
Background: Modern biology has shifted from "one gene" approaches to methods for genomic-scale analysis like microarray technology, which allow simultaneous measurement ...
Vidar Beisvag, Frode K. R. Jünge, Hallgeir Be...
132
Voted
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 2 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
JCS
2010
135views more  JCS 2010»
15 years 21 days ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ICMI
2004
Springer
179views Biometrics» more  ICMI 2004»
15 years 7 months ago
Visual touchpad: a two-handed gestural input device
This paper presents the Visual Touchpad, a low-cost vision-based input device that allows for fluid two-handed interactions with desktop PCs, laptops, public kiosks, or large wall...
Shahzad Malik, Joseph Laszlo
IMC
2006
ACM
15 years 8 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan