Sciweavers

24 search results - page 4 / 5
» It Depends: Dependency Parser Comparison Using A Web-based E...
Sort
View
BIBE
2009
IEEE
131views Bioinformatics» more  BIBE 2009»
13 years 9 months ago
Learning Scaling Coefficient in Possibilistic Latent Variable Algorithm from Complex Diagnosis Data
—The Possibilistic Latent Variable (PLV) clustering algorithm is a powerful tool for the analysis of complex datasets due to its robustness toward data distributions of different...
Zong-Xian Yin
MIDDLEWARE
2007
Springer
13 years 12 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
SPE
2008
89views more  SPE 2008»
13 years 5 months ago
The Runabout
This paper presents a variation of the visitor pattern which allows programmers to write visitor-like code in a concise way. The Runabout is a library extension that adds a limited...
Christian Grothoff
CSFW
2009
IEEE
14 years 15 days ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
BMCBI
2006
142views more  BMCBI 2006»
13 years 5 months ago
RDMAS: a web server for RNA deleterious mutation analysis
Background: The diverse functions of ncRNAs critically depend on their structures. Mutations in ncRNAs disrupting the structures of functional sites are expected to be deleterious...
Wenjie Shu, Xiaochen Bo, Rujia Liu, Dongsheng Zhao...