Sciweavers

1323 search results - page 217 / 265
» Updatable Security Views
Sort
View
BMCBI
2006
136views more  BMCBI 2006»
13 years 7 months ago
Java GUI for InterProScan (JIPS): A tool to help process multiple InterProScans and perform ortholog analysis
Background: Recent, rapid growth in the quantity of available genomic data has generated many protein sequences that are not yet biochemically classified. Thus, the prediction of ...
Aijazuddin Syed, Chris Upton
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
13 years 6 months ago
Probabilistic target detection by camera-equipped UAVs
— This paper is motivated by the real world problem of search and rescue by unmanned aerial vehicles (UAVs). We consider the problem of tracking a static target from a bird’sey...
Andrew Colquhoun Symington, Sonia Waharte, Simon J...
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
13 years 6 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
ACSAC
2007
IEEE
14 years 2 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 18 days ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...