Sciweavers

2486 search results - page 433 / 498
» Database and the Web
Sort
View
IEEECIT
2010
IEEE
15 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
MICCAI
2009
Springer
16 years 6 months ago
Non-rigid Image Registration with Uniform Gradient Spherical Patterns
Abstract. In this paper, we propose a new feature based non-rigid image registration method for dealing with two important issues. First, in order to establish reliable anatomical ...
Shu Liao, Albert C. S. Chung
BMCBI
2010
106views more  BMCBI 2010»
15 years 5 months ago
Multiple structure alignment and consensus identification for proteins
Background: An algorithm is presented to compute a multiple structure alignment for a set of proteins and to generate a consensus (pseudo) protein which captures common substructu...
Ivaylo Ilinkin, Jieping Ye, Ravi Janardan
BMCBI
2010
163views more  BMCBI 2010»
15 years 5 months ago
DraGnET: Software for storing, managing and analyzing annotated draft genome sequence data
Background: New "next generation" DNA sequencing technologies offer individual researchers the ability to rapidly generate large amounts of genome sequence data at drama...
Stacy Duncan, Ruchita Sirkanungo, Leslie Miller, G...
ISW
2009
Springer
15 years 12 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...