Sciweavers

796 search results - page 112 / 160
» Spoofing prevention method
Sort
View
CSB
2002
IEEE
109views Bioinformatics» more  CSB 2002»
14 years 2 months ago
Towards Automatic Clustering of Protein Sequences
Analyzing protein sequence data becomes increasingly important recently. Most previous work on this area has mainly focused on building classification models. In this paper, we i...
Jiong Yang, Wei Wang 0010
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
14 years 2 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
GECCO
2010
Springer
178views Optimization» more  GECCO 2010»
14 years 2 months ago
Crossing the reality gap in evolutionary robotics by promoting transferable controllers
The reality gap, that often makes controllers evolved in simulation inefficient once transferred onto the real system, remains a critical issue in Evolutionary Robotics (ER); it p...
Sylvain Koos, Jean-Baptiste Mouret, Stéphan...
ICSE
2009
IEEE-ACM
14 years 2 months ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 2 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang