Sciweavers

1851 search results - page 293 / 371
» Open Source AI
Sort
View
SECRYPT
2007
121views Business» more  SECRYPT 2007»
15 years 4 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
120
Voted
APBC
2004
126views Bioinformatics» more  APBC 2004»
15 years 4 months ago
Informative 3D Visualization of Multiple Protein Structures
With the continued growth of three dimensional structural information databases comes a corresponding increase in interest in this data for the study of new sequences and an ever-...
Paulo Lai, Warren Kaplan, W. Bret Church, Raymond ...
BILDMED
2006
135views Algorithms» more  BILDMED 2006»
15 years 4 months ago
Restoration of the Sphere-Cortex Homeomorphism
Abstract. The proposed algorithm has been developed as a pre-processing tool for inflating cortical surface meshes, which have been created using segmentation and subsequent triang...
Andreas Mang, Michael Wagner 0002, Jan Müller...
CSAC
2004
15 years 4 months ago
Coordination practices within FLOSS development teams: The bug fixing process
Free/Libre Open Source Software (FLOSS) is primarily developed by distributed teams. Developers contribute from around the world and coordinate their activity almost exclusively by...
Kevin Crowston, Barbara Scozzi
131
Voted
CSREASAM
2006
15 years 4 months ago
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures
- A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manne...
Craig Valli