Sciweavers

7 search results - page 2 / 2
» Secure text processing with applications to private DNA matc...
Sort
View
SEKE
2010
Springer
13 years 4 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
BMCBI
2008
160views more  BMCBI 2008»
13 years 5 months ago
Cross-species and cross-platform gene expression studies with the Bioconductor-compliant R package 'annotationTools'
Background: The variety of DNA microarray formats and datasets presently available offers an unprecedented opportunity to perform insightful comparisons of heterogeneous data. Cro...
Alexandre Kuhn, Ruth Luthi-Carter, Mauro Delorenzi