Sciweavers

266 search results - page 53 / 54
» A Demonstration of Neural Programming Applied to Non-Markovi...
Sort
View
BMCBI
2008
158views more  BMCBI 2008»
13 years 5 months ago
Real value prediction of protein solvent accessibility using enhanced PSSM features
Background: Prediction of protein solvent accessibility, also called accessible surface area (ASA) prediction, is an important step for tertiary structure prediction directly from...
Darby Tien-Hao Chang, Hsuan-Yu Huang, Yu-Tang Syu,...
NDSS
2008
IEEE
14 years 5 days ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
13 years 11 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
CCS
2006
ACM
13 years 9 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
BMCBI
2005
151views more  BMCBI 2005»
13 years 5 months ago
stam - a Bioconductor compliant R package for structured analysis of microarray data
Background: Genome wide microarray studies have the potential to unveil novel disease entities. Clinically homogeneous groups of patients can have diverse gene expression profiles...
Claudio Lottaz, Rainer Spang