Sciweavers

678 search results - page 112 / 136
» MAGIC Tool: integrated microarray data analysis
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ISBI
2006
IEEE
15 years 10 months ago
Development of a research interface for image guided intervention: initial application to epilepsy neurosurgery
This paper describes the development and application of methods to integrate research image analysis methods and software with a commercial image guided surgery navigation system ...
Xenophon Papademetris, Kenneth P. Vives, Marcello ...
ITRUST
2004
Springer
15 years 3 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
TOMACS
2002
110views more  TOMACS 2002»
14 years 9 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann
BMCBI
2005
122views more  BMCBI 2005»
14 years 9 months ago
FACT - a framework for the functional interpretation of high-throughput experiments
Background: Interpreting the results of high-throughput experiments, such as those obtained from DNA-microarrays, is an often time-consuming task due to the high number of data-po...
Felix Kokocinski, Nicolas Delhomme, Gunnar Wrobel,...