Sciweavers

5934 search results - page 1118 / 1187
» Detecting a Network Failure
Sort
View
ICASSP
2009
IEEE
16 years 3 days ago
Conditional random fields for the prediction of signal peptide cleavage sites
Correct prediction of signal peptide cleavage sites has a significant impact on drug design. State-of-the-art approaches to cleavage site prediction typically use generative mode...
Man-Wai Mak, Sun-Yuan Kung
ICC
2009
IEEE
118views Communications» more  ICC 2009»
16 years 3 days ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
INFOCOM
2009
IEEE
16 years 14 hour ago
Fit a Spread Estimator in Small Memory
—The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a...
MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Pei...
UIC
2009
Springer
15 years 12 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
FC
2009
Springer
92views Cryptology» more  FC 2009»
15 years 12 months ago
Deterring Online Advertising Fraud through Optimal Payment in Arrears
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountabili...
Benjamin Edelman
« Prev « First page 1118 / 1187 Last » Next »