Sciweavers

5722 search results - page 312 / 1145
» Security Function Interactions
Sort
View
114
Voted
ACIVS
2008
Springer
15 years 10 months ago
Scene Reconstruction Using MRF Optimization with Image Content Adaptive Energy Functions
Multi-view scene reconstruction from multiple uncalibrated images can be solved by two stages of processing: first, a sparse reconstruction using Structure From Motion (SFM), and ...
Ping Li, Rene Klein Gunnewiek, Peter H. N. de With
110
Voted
BMCBI
2008
90views more  BMCBI 2008»
15 years 3 months ago
Function2Gene: A gene selection tool to increase the power of genetic association studies by utilizing public databases and expe
Background: Many common disorders have multiple genetic components which convey increased susceptibility. SNPs have been used to identify genetic components which are associated w...
Don L. Armstrong, Chaim O. Jacob, Raphael Zidovetz...
133
Voted
BMCBI
2006
139views more  BMCBI 2006»
15 years 3 months ago
Integrated functional visualization of eukaryotic genomes
Background: Increasing amounts of data from large scale whole genome analysis efforts demands convenient tools for manipulation, visualization and investigation. Whole genome plot...
Rohit Ghai, Hannes Lindemann, Trinad Chakraborty
109
Voted
COMPLEX
2009
Springer
15 years 10 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
MOBISEC
2009
Springer
15 years 10 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan