Sciweavers

143 search results - page 17 / 29
» Detecting group activities using rigidity of formation
Sort
View
79
Voted
CN
2004
106views more  CN 2004»
14 years 9 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
SIGMOD
2000
ACM
158views Database» more  SIGMOD 2000»
15 years 1 months ago
NiagaraCQ: A Scalable Continuous Query System for Internet Databases
Continuous queries are persistent queries that allow users to receive new results when they become available. While continuous query systems can transform a passive web into an ac...
Jianjun Chen, David J. DeWitt, Feng Tian, Yuan Wan...
ISBI
2002
IEEE
15 years 10 months ago
Correction for external LOR effects in listmode reconstruction for PET
In PET imaging listmode is an alternative for projections to store the acquisition data with more accuracy. The reconstruction starting from the listmode format requires different...
Stefaan Vandenberghe, Yves D'Asseler, Rik Van de W...
ICSM
2005
IEEE
15 years 3 months ago
Co-Change Visualization
Clustering layouts of software systems combine two important aspects: they reveal groups of related artifacts of the software system, and they produce a visualization of the resul...
Dirk Beyer
85
Voted
BMCBI
2010
191views more  BMCBI 2010»
14 years 4 months ago
Molecular dynamics simulation studies and in vitro site directed mutagenesis of avian beta-defensin Apl_AvBD2
Background: Defensins comprise a group of antimicrobial peptides, widely recognized as important elements of the innate immune system in both animals and plants. Cationicity, rath...
Soja Saghar Soman, Krishnankutty Chandrika Sivakum...