Sciweavers

403 search results - page 71 / 81
» Testing the cluster hypothesis in distributed information re...
Sort
View
CCGRID
2009
IEEE
14 years 3 months ago
Harvesting Large-Scale Grids for Software Resources
— Grid infrastructures are in operation around the world, federating an impressive collection of computational resources and a wide variety of application software. In this conte...
Asterios Katsifodimos, George Pallis, Marios D. Di...
NDSS
2002
IEEE
14 years 1 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
CIKM
2008
Springer
13 years 10 months ago
Multi-aspect expertise matching for review assignment
Review assignment is a common task that many people such as conference organizers, journal editors, and grant administrators would have to do routinely. As a computational problem...
Maryam Karimzadehgan, ChengXiang Zhai, Geneva G. B...
BMCBI
2008
153views more  BMCBI 2008»
13 years 8 months ago
Estimating the size of the solution space of metabolic networks
Background: Cellular metabolism is one of the most investigated system of biological interactions. While the topological nature of individual reactions and pathways in the network...
Alfredo Braunstein, Roberto Mulet, Andrea Pagnani
WWW
2008
ACM
14 years 9 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...