Sciweavers

579 search results - page 107 / 116
» Secure Access to Medical Data over the Internet
Sort
View
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
14 years 9 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
94
Voted
MOBICOM
2010
ACM
14 years 9 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
BMCBI
2008
127views more  BMCBI 2008»
14 years 9 months ago
AMMO-Prot: amine system project 3D-model finder
Background: Amines are biogenic amino acid derivatives, which play pleiotropic and very important yet complex roles in animal physiology. For many other relevant biomolecules, bio...
Ismael Navas Delgado, Raúl Montañez,...
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
15 years 2 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano