Sciweavers

1985 search results - page 302 / 397
» Multiresolution Analysis of Connectivity
Sort
View
ESORICS
2007
Springer
15 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
GCB
2007
Springer
161views Biometrics» more  GCB 2007»
15 years 5 months ago
High-Precision Function Prediction using Conserved Interactions
: The recent availability of large data sets of protein- protein-interactions (PPIs) from various species offers new opportunities for functional genomics and proteomics. We descri...
Samira Jaeger, Ulf Leser
IBPRIA
2007
Springer
15 years 5 months ago
Improving Piecewise-Linear Registration Through Mesh Optimization
Abstract. Piecewise-linear methods accomplish the registration by dividing the images in corresponding triangular patches, which are individually mapped through affine transformati...
Vicente Arévalo, Javier González
W2GIS
2007
Springer
15 years 5 months ago
Towards the Geo-spatial Querying of the Semantic Web with ONTOAST
One of the challenges raised by the construction of the semantic Web lies in the analysis and management of complex relationships (thematic, spatial and temporal) connecting severa...
Alina Dia Miron, Jérôme Gensel, Marl&...
AICT
2006
IEEE
15 years 5 months ago
Optimal Solution of the Maximum All Request Path Grooming Problem
— We give an optimal solution to the Maximum All Request Path Grooming (MARPG) problem motivated by a traffic grooming application. The MARPG problem consists in finding the ma...
Jean-Claude Bermond, Michel Cosnard, David Coudert...