Sciweavers

1575 search results - page 286 / 315
» A Behavioral Analysis of Computational Models of Visual Atte...
Sort
View
103
Voted
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
15 years 12 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
109
Voted
BMCBI
2005
116views more  BMCBI 2005»
14 years 11 months ago
WEBnm@: a web application for normal mode analyses of proteins
Background: Normal mode analysis (NMA) has become the method of choice to investigate the slowest motions in macromolecular systems. NMA is especially useful for large biomolecula...
Siv Midtun Hollup, Gisle Sælensminde, Nathal...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 11 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
BMCBI
2007
155views more  BMCBI 2007»
14 years 11 months ago
ProCMD: a database and 3D web resource for protein C mutants
Background: Activated Protein C (ProC) is an anticoagulant plasma serine protease which also plays an important role in controlling inflammation and cell proliferation. Several mu...
Pasqualina D'Ursi, Francesca Marino, Andrea Caprer...
MSWIM
2009
ACM
15 years 6 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe