Sciweavers

70 search results - page 13 / 14
» Reverse engineering under siege
Sort
View
BMCBI
2008
166views more  BMCBI 2008»
13 years 5 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
SAC
2009
ACM
14 years 17 days ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ALMOB
2006
113views more  ALMOB 2006»
13 years 5 months ago
Inverse bifurcation analysis: application to simple gene systems
Background: Bifurcation analysis has proven to be a powerful method for understanding the qualitative behavior of gene regulatory networks. In addition to the more traditional for...
James Lu, Heinz W. Engl, Peter Schuster
ANSOFT
2002
94views more  ANSOFT 2002»
13 years 5 months ago
Testing Processes of Web Applications
Abstract. Current practice in Web application development is based on the skills of the individual programmers and often does not apply the principles of software engineering. The ...
Filippo Ricca, Paolo Tonella
DEXA
2009
Springer
151views Database» more  DEXA 2009»
14 years 10 days ago
Automatic Extraction of Ontologies Wrapping Relational Data Sources
Describing relational data sources (i.e. databases) by means of ontologies constitutes the foundation of most of the semantic based approaches to data access and integration. In sp...
Lina Lubyte, Sergio Tessaris