Sciweavers

1365 search results - page 249 / 273
» Simple authentication for the web
Sort
View
WWW
2003
ACM
15 years 10 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
EUROSYS
2008
ACM
15 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
BMCBI
2008
129views more  BMCBI 2008»
14 years 9 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...
ICCV
2003
IEEE
15 years 11 months ago
Feature Selection for Unsupervised and Supervised Inference: the Emergence of Sparsity in a Weighted-based Approach
The problem of selecting a subset of relevant features in a potentially overwhelming quantity of data is classic and found in many branches of science. Examples in computer vision...
Lior Wolf, Amnon Shashua
100
Voted
MICCAI
2003
Springer
15 years 10 months ago
Extraction and Application of Expert Priors to Combine Multiple Segmentations of Human Brain Tissue
Abstract. This paper evaluates strategies to combine multiple segmentations of the same image, generated for example by different segmentation methods or by different human experts...
Torsten Rohlfing, Daniel B. Russakoff, Calvin R. M...