Sciweavers

526 search results - page 94 / 106
» Increase honeypot security through data analysis
Sort
View
103
Voted
BCSHCI
2009
14 years 7 months ago
Virtual world users evaluated according to environment design, task based and affective attention measures
This paper presents research that engages with virtual worlds for education users to understand design of these applications for their needs. An in-depth multi-method investigatio...
Breen Sweeney, Anne Adams
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 3 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
BIBE
2007
IEEE
127views Bioinformatics» more  BIBE 2007»
15 years 3 months ago
A Heuristic for Phylogenetic Reconstruction Using Transposition
Abstract—Because of the advent of high-throughput sequencing and the consequent reduction in cost of sequencing, many organisms have been completely sequenced and most of their g...
Feng Yue, Meng Zhang, Jijun Tang
DOCENG
2005
ACM
14 years 11 months ago
Injecting information into atomic units of text
This paper presents a new approach to text processing, based on textemes. These are atomic text units generalising the concepts of character and glyph by merging them in a common ...
Yannis Haralambous, Gábor Bella
BMCBI
2008
124views more  BMCBI 2008»
14 years 9 months ago
Ontology-based, Tissue MicroArray oriented, image centered tissue bank
Background: Tissue MicroArray technique is becoming increasingly important in pathology for the validation of experimental data from transcriptomic analysis. This approach produce...
Federica Viti, Ivan Merelli, Andrea Caprera, Barba...