Sciweavers

5962 search results - page 1120 / 1193
» Working with Patterns and Code
Sort
View
166
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 9 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
167
Voted
NAR
2010
165views more  NAR 2010»
14 years 9 months ago
PhosPhAt: the Arabidopsis thaliana phosphorylation site database. An update
: Growth and development of plants depends on uptake and assimilation of nutrients. Many assimilation products of macronutrients are not only essential for plant growth but also ha...
Pawel Durek, Robert Schmidt, Joshua L. Heazlewood,...
TCIAIG
2010
14 years 9 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
199
Voted
ECOI
2011
240views ECommerce» more  ECOI 2011»
14 years 9 months ago
HerbariaViz: A web-based client-server interface for mapping and exploring flora observation data
The potential for physical flora collections to support scientific research is being enhanced by rapid development of digital databases that represent characteristics of the physic...
Tom Auer, Alan M. MacEachren, Craig McCabe, Scott ...
120
Voted
JOCN
2011
94views more  JOCN 2011»
14 years 9 months ago
ERP Correlates of Word Production before and after Stroke in an Aphasic Patient
■ Changes in brain activity characterizing impaired speech production after brain damage have usually been investigated by comparing aphasic speakers with healthy subjects becau...
Marina Laganaro, Stéphanie Morand, Christop...
« Prev « First page 1120 / 1193 Last » Next »