Sciweavers

60 search results - page 12 / 12
» Detecting Anomalous and Unknown Intrusions Against Programs
Sort
View
AINA
2010
IEEE
13 years 10 months ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...
BMCBI
2005
152views more  BMCBI 2005»
13 years 5 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
BMCBI
2006
114views more  BMCBI 2006»
13 years 5 months ago
Impact of RNA structure on the prediction of donor and acceptor splice sites
Background: gene identification in genomic DNA sequences by computational methods has become an important task in bioinformatics and computational gene prediction tools are now es...
Sayed-Amir Marashi, Changiz Eslahchi, Hamid Pezesh...
BMCBI
2007
165views more  BMCBI 2007»
13 years 5 months ago
Ab initio identification of human microRNAs based on structure motifs
Background: MicroRNAs (miRNAs) are short, non-coding RNA molecules that are directly involved in post-transcriptional regulation of gene expression. The mature miRNA sequence bind...
Markus Brameier, Carsten Wiuf