Sciweavers

16070 search results - page 92 / 3214
» Identifying
Sort
View
IJDE
2007
123views more  IJDE 2007»
15 years 3 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
JPDC
2007
112views more  JPDC 2007»
15 years 3 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
BMCBI
2002
134views more  BMCBI 2002»
15 years 3 months ago
CoreGenes: A computational tool for identifying and cataloging "core" genes in a set of small genomes
Background: Improvements in DNA sequencing technology and methodology have led to the rapid expansion of databases comprising DNA sequence, gene and genome data. Lower operational...
Nikhat Zafar, Raja Mazumder, Donald Seto
MICCAI
2010
Springer
15 years 1 months ago
Biomarkers for Identifying First-Episode Schizophrenia Patients Using Diffusion Weighted Imaging
Recent advances in diffusion weighted MR imaging (dMRI) has made it a tool of choice for investigating white matter abnormalities of the brain and central nervous system. In this w...
Yogesh Rathi, James G. Malcolm, Oleg V. Michailovi...
IC3
2009
15 years 1 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...