Sciweavers

303 search results - page 60 / 61
» Semantic Web Services Composition: A Network Analysis Approa...
Sort
View
BMCBI
2008
124views more  BMCBI 2008»
13 years 5 months ago
Ontology-based, Tissue MicroArray oriented, image centered tissue bank
Background: Tissue MicroArray technique is becoming increasingly important in pathology for the validation of experimental data from transcriptomic analysis. This approach produce...
Federica Viti, Ivan Merelli, Andrea Caprera, Barba...
CGO
2006
IEEE
13 years 11 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
IKE
2010
13 years 3 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 4 days ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
ASWEC
2006
IEEE
13 years 11 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...