Sciweavers

1018 search results - page 200 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 9 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
BMCBI
2008
187views more  BMCBI 2008»
13 years 7 months ago
PSAT: A web tool to compare genomic neighborhoods of multiple prokaryotic genomes
Background: The conservation of gene order among prokaryotic genomes can provide valuable insight into gene function, protein interactions, or events by which genomes have evolved...
Christine Fong, Laurence Rohmer, Matthew Radey, Mi...
PRESENCE
2002
88views more  PRESENCE 2002»
13 years 7 months ago
Measurement, Analysis and Display of Haptic Signals During Surgical Cutting
The forces experienced while surgically cutting anatomical tissues from a sheep and two rats were investigated for three scissor types. Data were collected in situ using instrumen...
Stephanie Greenish, Vincent Hayward, Vanessa B. Ch...
TMI
2010
172views more  TMI 2010»
13 years 6 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...