Sciweavers

1257 search results - page 191 / 252
» Gathering Product Data from Smart Products
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
15 years 4 months ago
Predicting Protective Linear B-Cell Epitopes Using Evolutionary Information
Mapping B-cell epitopes plays an important role in vaccine design, immunodiagnostic tests, and antibody production. Because the experimental determination of B-cell epitopes is ti...
Yasser El-Manzalawy, Drena Dobbs, Vasant Honavar
ICASSP
2008
IEEE
15 years 4 months ago
Audiovisual-to-articulatory speech inversion using Active Appearance Models for the face and Hidden Markov Models for the dynami
We are interested in recovering aspects of vocal tract’s geometry and dynamics from auditory and visual speech cues. We approach the problem in a statistical framework based on ...
Athanassios Katsamanis, George Papandreou, Petros ...
CSB
2005
IEEE
142views Bioinformatics» more  CSB 2005»
15 years 3 months ago
BioMap: Discovering Schema Mapping Using Ontologies
Biologists currently devote significant time and effort searching information for their research. The wide diversity in terminology used inhibit effective computerized and manual...
Zoé Lacroix, Sumedha Gholba, Hervé M...
IPPS
2005
IEEE
15 years 3 months ago
Practical Divisible Load Scheduling on Grid Platforms with APST-DV
Divisible load applications consist of a load, that is input data and associated computation, that can be divided arbitrarily into independent pieces. Such applications arise in m...
Krijn van der Raadt, Yang Yang, Henri Casanova