Sciweavers

1575 search results - page 283 / 315
» The provenance of electronic data
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 10 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
BMCBI
2006
145views more  BMCBI 2006»
13 years 10 months ago
GEM System: automatic prototyping of cell-wide metabolic pathway models from genomes
Background: Successful realization of a "systems biology" approach to analyzing cells is a grand challenge for our understanding of life. However, current modeling appro...
Kazuharu Arakawa, Yohei Yamada, Kosaku Shinoda, Yo...
JUCS
2008
147views more  JUCS 2008»
13 years 9 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
BMCBI
2005
251views more  BMCBI 2005»
13 years 9 months ago
Contextual weighting for Support Vector Machines in literature mining: an application to gene versus protein name disambiguation
Background: The ability to distinguish between genes and proteins is essential for understanding biological text. Support Vector Machines (SVMs) have been proven to be very effici...
Tapio Pahikkala, Filip Ginter, Jorma Boberg, Jouni...
ANSOFT
2002
126views more  ANSOFT 2002»
13 years 9 months ago
The Real-Time Process Algebra (RTPA)
Abstract. The real-time process algebra (RTPA) is a set of new mathematical notations for formally describing system architectures, and static and dynamic behaviors. It is recogniz...
Yingxu Wang