Sciweavers

212 search results - page 43 / 43
» Hybrid Analysis and Control of Malware
Sort
View
BMCBI
2010
106views more  BMCBI 2010»
12 years 12 months ago
Identification and correction of previously unreported spatial phenomena using raw Illumina BeadArray data
Background: A key stage for all microarray analyses is the extraction of feature-intensities from an image. If this step goes wrong, then subsequent preprocessing and processing s...
Mike L. Smith, Mark J. Dunning, Simon Tavaré...
ACMSE
2008
ACM
13 years 7 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins