Sciweavers

321 search results - page 36 / 65
» Comparison of Additive Trees Using Circular Orders
Sort
View
ICPR
2008
IEEE
16 years 29 days ago
Phase based level set segmentation of blood vessels
The segmentation and analysis of blood vessels has received much attention in the research community. The results aid numerous applications for diagnosis and treatment of vascular...
Gunnar Läthén, Jimmy Jonasson, Magnus ...
ICCCN
2008
IEEE
15 years 6 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang
ACSAC
2007
IEEE
15 years 6 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
ISMB
2007
15 years 2 months ago
Computational prediction of host-pathogen protein-protein interactions
Our major effort in this reporting period comprised functional genomic studies of key genes for carbon metabolite and nodulation/nitrogen fixation in Sinorhizobium meliloti, compar...
Matthew D. Dyer, T. M. Murali, Bruno W. S. Sobral
66
Voted
CORR
2008
Springer
78views Education» more  CORR 2008»
14 years 12 months ago
Verified Null-Move Pruning
In this article we review standard null-move pruning and introduce our extended version of it, which we call verified null-move pruning. In verified null-move pruning, whenever th...
Omid David-Tabibi, Nathan S. Netanyahu