Sciweavers

1323 search results - page 217 / 265
» Updatable Security Views
Sort
View
BMCBI
2006
136views more  BMCBI 2006»
15 years 2 months ago
Java GUI for InterProScan (JIPS): A tool to help process multiple InterProScans and perform ortholog analysis
Background: Recent, rapid growth in the quantity of available genomic data has generated many protein sequences that are not yet biochemically classified. Thus, the prediction of ...
Aijazuddin Syed, Chris Upton
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
15 years 29 days ago
Probabilistic target detection by camera-equipped UAVs
— This paper is motivated by the real world problem of search and rescue by unmanned aerial vehicles (UAVs). We consider the problem of tracking a static target from a bird’sey...
Andrew Colquhoun Symington, Sonia Waharte, Simon J...
106
Voted
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
15 years 26 days ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
ACSAC
2007
IEEE
15 years 8 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
15 years 7 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...