Sciweavers

249 search results - page 20 / 50
» Conformational analysis: A new approach by means of chemomet...
Sort
View
ISBI
2004
IEEE
15 years 10 months ago
Clustering-Based Framework for Comparing fMRI Analysis Methods
In this paper, a cluster-based framework is introduced for comparing analysis methods of functional magnetic resonance images (fMRI). In the proposed framework, fMRI data is repla...
Hamid Soltanian-Zadeh, Gholam-Ali Hossein-Zadeh, A...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 3 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
BMCBI
2005
150views more  BMCBI 2005»
14 years 9 months ago
Approaching the taxonomic affiliation of unidentified sequences in public databases - an example from the mycorrhizal fungi
Background: During the last few years, DNA sequence analysis has become one of the primary means of taxonomic identification of species, particularly so for species that are minut...
R. Henrik Nilsson, Erik Kristiansson, Martin Ryber...
ER
2006
Springer
98views Database» more  ER 2006»
15 years 1 months ago
Domain Analysis for Supporting Commercial Off-the-Shelf Components Selection
Though new technological trends and paradigms arise for developing complex software systems, systematic reuse continues to be an elusive goal. In this context, the adoption of Comm...
Claudia P. Ayala, Xavier Franch
ENTCS
2007
105views more  ENTCS 2007»
14 years 9 months ago
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It...
Srecko Brlek, Sardaouna Hamadou, John Mullins