Sciweavers

13 search results - page 3 / 3
» An Evaluation of Machine Learning-Based Methods for Detectio...
Sort
View
BIBM
2007
IEEE
104views Bioinformatics» more  BIBM 2007»
13 years 9 months ago
A Protocol to Detect Local Affinities Involved in Proteins Distant Interactions
The tridimensional structure of a protein is constrained or stabilized by some local interactions between distant residues of the protein, such as disulfide bonds, electrostatic i...
Christophe Nicolas Magnan, Cécile Capponi, ...
DIMVA
2009
13 years 6 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
BMCBI
2007
151views more  BMCBI 2007»
13 years 5 months ago
A comparison study on algorithms of detecting long forms for short forms in biomedical text
Motivation: With more and more research dedicated to literature mining in the biomedical domain, more and more systems are available for people to choose from when building litera...
Manabu Torii, Zhang-Zhi Hu, Min Song, Cathy H. Wu,...