Sciweavers

369 search results - page 72 / 74
» Information Retrieval and Information Extraction in TREC Gen...
Sort
View
DRM
2007
Springer
13 years 12 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
WWW
2007
ACM
14 years 6 months ago
Combining classifiers to identify online databases
We address the problem of identifying the domain of online databases. More precisely, given a set F of Web forms automatically gathered by a focused crawler and an online database...
Luciano Barbosa, Juliana Freire
BMCBI
2005
105views more  BMCBI 2005»
13 years 5 months ago
SNPHunter: a bioinformatic software for single nucleotide polymorphism data acquisition and management
Background: Single nucleotide polymorphisms (SNPs) provide an important tool in pinpointing susceptibility genes for complex diseases and in unveiling human molecular evolution. S...
Lin Wang, Simin Liu, Tianhua Niu, Xin Xu
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
14 years 17 days ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
APBC
2004
125views Bioinformatics» more  APBC 2004»
13 years 7 months ago
A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction
Protein structure prediction is considered to be the holy grail of bioinformatics. Ab initio and homology modelling are two important groups of methods used in protein structure p...
Saravanan Dayalan, Savitri Bevinakoppa, Heiko Schr...