top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The articles of the charge of the wardmote inquest [[electronic resource]]
The articles of the charge of the wardmote inquest [[electronic resource]]
Pubbl/distr/stampa [London], : Printed by Andrew Clark, printer to the Honourable City of London, 1671
Descrizione fisica 1 sheet ([3] p.)
Soggetto genere / forma Broadsides17th century.England
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996383811503316
[London], : Printed by Andrew Clark, printer to the Honourable City of London, 1671
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational Methods for SNPs and Haplotype Inference [[electronic resource] ] : DIMACS/RECOMB Satellite Workshop, Piscataway, NJ, USA, November 21-22, 2002, Revised Papers / / edited by Sorin Istrail, Michael Waterman, Andrew Clark
Computational Methods for SNPs and Haplotype Inference [[electronic resource] ] : DIMACS/RECOMB Satellite Workshop, Piscataway, NJ, USA, November 21-22, 2002, Revised Papers / / edited by Sorin Istrail, Michael Waterman, Andrew Clark
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 158 p.)
Disciplina 572.8/01/51
Collana Lecture Notes in Bioinformatics
Soggetto topico Biochemistry
Algorithms
Human genetics
Computer science—Mathematics
Mathematical statistics
Database management
Biochemistry, general
Algorithm Analysis and Problem Complexity
Human Genetics
Discrete Mathematics in Computer Science
Probability and Statistics in Computer Science
Database Management
ISBN 1-280-30709-9
9786610307098
3-540-24719-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trisomic Phase Inference -- Trisomic Phase Inference -- An Overview of Combinatorial Methods for Haplotype Inference -- A Survey of Computational Methods for Determining Haplotypes -- Haplotype Inference and Its Application in Linkage Disequilibrium Mapping -- Inferring Piecewise Ancestral History from Haploid Sequences -- Haplotype Blocks in Small Populations -- Simulating a Coalescent Process with Recombination and Ascertainment -- Dynamic Programming Algorithms for Haplotype Block Partitioning and Tag SNP Selection Using Haplotype Data or Genotype Data -- Parametric Bootstrap for Assessment of Goodness of Fit of Models for Block Haplotype Structure -- A Coalescent-Based Approach for Complex Disease Mapping -- Abstracts -- Haplotyping as Perfect Phylogeny -- Exhaustive Enumeration and Bayesian Phase Inference -- How Does Choice of Polymorphism Influence Estimation of LD and Mapping? -- Haplotype Inference in Random Population Samples -- Bayesian Methods for Statistical Reconstruction of Haplotypes -- Combinatorial Approaches to Haplotype Inference -- Large Scale Recovery of Haplotypes from Genotype Data Using Imperfect Phylogeny -- Haplotype Inference and Haplotype Information -- Multi-locus Linkage Disequilibrium and Haplotype-Based Tests of Association -- The Pattern of Polymorphism on Human Chromosome 21 -- Use of a Local Approximation to the Ancestral Recombination Graph for Fine Mapping Disease Genes -- Insights into Recombination from Patterns of Linkage Disequilibrium -- Joint Bayesian Estimation of Mutation Location and Age Using Linkage Disequilibrium -- Evolutionary-Based Association Analysis Using Haplotype Data -- Inferring Piecewise Ancestral History from Haploid Sequences -- Testing for Differences in Haplotype Frequencies in Case-Control Studies -- Haplotypes, Hotspots, and a Multilocus Model for Linkage Disequilibrium -- Dynamic Programming Algorithms for Haplotype Block Partition and Applications to Association Studies -- Genome Sharing in Small Populations -- Patterns of Linkage Disequilibrium across Human Chromosomes 6, 21, AND 22 -- A Software System for Automated and Visual Analysis of Functionally Annotated Haplotypes -- Assessment of Goodness of Fit of Models for Block Haplotype Structure.
Record Nr. UNISA-996465537503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational Methods for SNPs and Haplotype Inference : DIMACS/RECOMB Satellite Workshop, Piscataway, NJ, USA, November 21-22, 2002, Revised Papers / / edited by Sorin Istrail, Michael Waterman, Andrew Clark
Computational Methods for SNPs and Haplotype Inference : DIMACS/RECOMB Satellite Workshop, Piscataway, NJ, USA, November 21-22, 2002, Revised Papers / / edited by Sorin Istrail, Michael Waterman, Andrew Clark
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 158 p.)
Disciplina 572.8/01/51
Collana Lecture Notes in Bioinformatics
Soggetto topico Biochemistry
Algorithms
Human genetics
Computer science—Mathematics
Mathematical statistics
Database management
Biochemistry, general
Algorithm Analysis and Problem Complexity
Human Genetics
Discrete Mathematics in Computer Science
Probability and Statistics in Computer Science
Database Management
ISBN 1-280-30709-9
9786610307098
3-540-24719-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trisomic Phase Inference -- Trisomic Phase Inference -- An Overview of Combinatorial Methods for Haplotype Inference -- A Survey of Computational Methods for Determining Haplotypes -- Haplotype Inference and Its Application in Linkage Disequilibrium Mapping -- Inferring Piecewise Ancestral History from Haploid Sequences -- Haplotype Blocks in Small Populations -- Simulating a Coalescent Process with Recombination and Ascertainment -- Dynamic Programming Algorithms for Haplotype Block Partitioning and Tag SNP Selection Using Haplotype Data or Genotype Data -- Parametric Bootstrap for Assessment of Goodness of Fit of Models for Block Haplotype Structure -- A Coalescent-Based Approach for Complex Disease Mapping -- Abstracts -- Haplotyping as Perfect Phylogeny -- Exhaustive Enumeration and Bayesian Phase Inference -- How Does Choice of Polymorphism Influence Estimation of LD and Mapping? -- Haplotype Inference in Random Population Samples -- Bayesian Methods for Statistical Reconstruction of Haplotypes -- Combinatorial Approaches to Haplotype Inference -- Large Scale Recovery of Haplotypes from Genotype Data Using Imperfect Phylogeny -- Haplotype Inference and Haplotype Information -- Multi-locus Linkage Disequilibrium and Haplotype-Based Tests of Association -- The Pattern of Polymorphism on Human Chromosome 21 -- Use of a Local Approximation to the Ancestral Recombination Graph for Fine Mapping Disease Genes -- Insights into Recombination from Patterns of Linkage Disequilibrium -- Joint Bayesian Estimation of Mutation Location and Age Using Linkage Disequilibrium -- Evolutionary-Based Association Analysis Using Haplotype Data -- Inferring Piecewise Ancestral History from Haploid Sequences -- Testing for Differences in Haplotype Frequencies in Case-Control Studies -- Haplotypes, Hotspots, and a Multilocus Model for Linkage Disequilibrium -- Dynamic Programming Algorithms for Haplotype Block Partition and Applications to Association Studies -- Genome Sharing in Small Populations -- Patterns of Linkage Disequilibrium across Human Chromosomes 6, 21, AND 22 -- A Software System for Automated and Visual Analysis of Functionally Annotated Haplotypes -- Assessment of Goodness of Fit of Models for Block Haplotype Structure.
Record Nr. UNINA-9910144204103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Information Security and Privacy [[electronic resource] ] : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XIII, 488 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Operating systems (Computers)
Algorithms
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Operating Systems
Algorithm Analysis and Problem Complexity
ISBN 3-540-45030-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.
Record Nr. UNISA-996465816303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XIII, 488 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Operating systems (Computers)
Algorithms
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Operating Systems
Algorithm Analysis and Problem Complexity
ISBN 3-540-45030-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.
Record Nr. UNINA-9910767558003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Recent Advances in Intrusion Detection [[electronic resource] ] : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XII, 340 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-74320-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
Record Nr. UNISA-996465522703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Recent Advances in Intrusion Detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XII, 340 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-74320-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
Record Nr. UNINA-9910484233803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui