Sciweavers

1605 search results - page 285 / 321
» An XML implementation process model for enterprise applicati...
Sort
View
PKDD
2009
Springer
94views Data Mining» more  PKDD 2009»
15 years 6 months ago
OTTHO: On the Tip of My THOught
In this paper we propose a system to solve a language game, called Guillotine, which requires a player with a strong cultural and linguistic background knowledge. The player obser...
Pierpaolo Basile, Marco Degemmis, Pasquale Lops, G...
USS
2008
15 years 2 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
BRAIN
2010
Springer
15 years 27 days ago
Cognitive Informatics and Denotational Mathematical Means for Brain Informatics
Cognitive informatics studies the natural intelligence and the brain from a theoretical and a computational approach, which rigorously explains the ms of the brain by a fundamental...
Yingxu Wang
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
14 years 12 months ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
BMCBI
2010
120views more  BMCBI 2010»
14 years 12 months ago
Optimal contact definition for reconstruction of Contact Maps
Background: Contact maps have been extensively used as a simplified representation of protein structures. They capture most important features of a protein's fold, being pref...
Jose M. Duarte, Rajagopal Sathyapriya, Henning Ste...