Discovery - Top 10
Type
Date issued
Journal/Proceeding/Conference
(13)
(4)
(2)
(2)
(2)
Language
(308)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | 92 | ||
Dynamic software birthmark for java based on heap memory analysis Proceeding/Conference:Lecture Notes in Computer Science | 2011 | 75 | ||
Secure Query Processing with Data Interoperability in a Cloud Database Environment Proceeding/Conference:Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data | 2014 | 62 | ||
Improving Multiple Sequence Alignment by Using Better Guide Trees Proceeding/Conference:International Symposium on Bioinformatics Research and Applications (ISBRA) | 2014 | 46 | ||
Assembling short reads with much less memory Proceeding/Conference:International Meeting on Human Genome Variation & Complex Genome Analysis, HGV 2009 | 2009 | 52 | ||
Providing distributed certificate authority service in cluster-based mobile ad hoc networks Journal:Computer Communications | 2007 | 72 | ||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | 49 | ||
Data Framing Attacks against Nonlinear State Estimation in Smart Grid Proceeding/Conference:IEEE Globecom Workshops (GC Wkshps) Proceedings | 2015 | 27 | ||
Predicting RNA secondary structures: one-grammar-fits-all solution Proceeding/Conference:Lecture Notes in Computer Science | 2015 | 32 | ||
Bioinformatics study of the lineage and tissue specificity of gene expression Proceeding/Conference:Research Postgraduate Symposium, RPS 2009 | 2009 | 59 | ||
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation Proceeding/Conference:Lecture Notes in Computer Science | 2013 | 48 | ||
GLProbs: aligning multiple sequences adaptively Proceeding/Conference:ACM BCB 2013 Conference Proceedings | 2013 | 63 | ||
Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples Proceeding/Conference:Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine (BCB '12) | 2012 | 95 | ||
Efficient methods for multiple sequence alignment with guaranteed error bounds Book:Encyclopedia of algorithms | 2008 | 62 | ||
DMPFinder - Finding differentiating pathways with gaps from two groups of metabolic networks Proceeding/Conference:International Conference on Bioinformatics and Computational Biology | 2011 | 71 | ||
2011 | 46 | |||
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography Proceeding/Conference:Lecture Notes in Engineering and Computer Science | 2013 | 240 | ||
Privacy-preserving advance power reservation Journal:IEEE Communications Magazine | 2012 | 39 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 | 42 | ||
IDBA-MT: De Novo Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology Journal:Journal of Computational Biology | 2013 | 103 | ||
2014 | 34 | |||
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers Proceeding/Conference:BMC Bioinformatics | 2010 | 54 | ||
Heap graph based software theft detection Journal:IEEE Transactions on Information Forensics and Security | 2013 | 156 | ||
VSPN: VANET-based Secure and Privacy-preserving Navigation Journal:IEEE Transactions on Computers | 2014 | 130 | ||
Filtering of false positive microRNA candidates by a clustering-based approach Proceeding/Conference:BMC Bioinformatics | 2008 | 55 |