Sciweavers

5550 search results - page 1051 / 1110
» Different Approaches to Proof Systems
Sort
View
BMCBI
2007
106views more  BMCBI 2007»
14 years 10 months ago
Discovering functional linkages and uncharacterized cellular pathways using phylogenetic profile comparisons: a comprehensive as
Background: A widely-used approach for discovering functional and physical interactions among proteins involves phylogenetic profile comparisons (PPCs). Here, proteins with simila...
Raja Jothi, Teresa M. Przytycka, L. Aravind
110
Voted
JPDC
2006
253views more  JPDC 2006»
14 years 10 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
PR
2008
159views more  PR 2008»
14 years 10 months ago
A two-stage head pose estimation framework and evaluation
Head pose is an important indicator of a person's focus of attention. Also, head pose estimation can be used as the front-end analysis for multi-view face analysis. For examp...
Junwen Wu, Mohan M. Trivedi
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
14 years 10 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
14 years 8 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
« Prev « First page 1051 / 1110 Last » Next »