Sciweavers

188 search results - page 11 / 38
» Injectivity analysis using interval analysis: Application to...
Sort
View
ICST
2009
IEEE
14 years 7 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
BMCBI
2007
128views more  BMCBI 2007»
14 years 9 months ago
A robust and efficient algorithm for the shape description of protein structures and its application in predicting ligand bindin
Background: An accurate description of protein shape derived from protein structure is necessary to establish an understanding of protein-ligand interactions, which in turn will l...
Lei Xie, Philip E. Bourne
58
Voted
PSYCHNOLOGY
2007
75views more  PSYCHNOLOGY 2007»
14 years 9 months ago
Is It Fun to Go to Sydney? Common-Sense Knowledge of Social Structures and WAP
This paper investigated how people navigate through early Wireless Application Protocol (WAP) sites using their common-sense knowledge of social structures. The study is based on ...
Ilpo Koskinen
DOCENG
2004
ACM
15 years 2 months ago
Creation of topic map by identifying topic chain in chinese
XML Topic maps enable multiple, concurrent views of sets of information objects and can be used to different applications. For example, thesaurus-like interfaces to corpora, navig...
Ching-Long Yeh, Yi-Chun Chen
KDD
2006
ACM
157views Data Mining» more  KDD 2006»
15 years 10 months ago
Using structure indices for efficient approximation of network properties
Statistics on networks have become vital to the study of relational data drawn from areas such as bibliometrics, fraud detection, bioinformatics, and the Internet. Calculating man...
Matthew J. Rattigan, Marc Maier, David Jensen