Sciweavers

2486 search results - page 433 / 498
» Database and the Web
Sort
View
109
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
MICCAI
2009
Springer
16 years 1 months ago
Non-rigid Image Registration with Uniform Gradient Spherical Patterns
Abstract. In this paper, we propose a new feature based non-rigid image registration method for dealing with two important issues. First, in order to establish reliable anatomical ...
Shu Liao, Albert C. S. Chung
121
Voted
BMCBI
2010
106views more  BMCBI 2010»
15 years 23 days ago
Multiple structure alignment and consensus identification for proteins
Background: An algorithm is presented to compute a multiple structure alignment for a set of proteins and to generate a consensus (pseudo) protein which captures common substructu...
Ivaylo Ilinkin, Jieping Ye, Ravi Janardan
115
Voted
BMCBI
2010
163views more  BMCBI 2010»
15 years 23 days ago
DraGnET: Software for storing, managing and analyzing annotated draft genome sequence data
Background: New "next generation" DNA sequencing technologies offer individual researchers the ability to rapidly generate large amounts of genome sequence data at drama...
Stacy Duncan, Ruchita Sirkanungo, Leslie Miller, G...
ISW
2009
Springer
15 years 7 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...