Sciweavers

424 search results - page 85 / 85
» Service-Oriented Commonality Analysis Across Existing System...
Sort
View
CCS
2007
ACM
13 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
SGP
2007
13 years 7 months ago
Dynamic geometry registration
We propose an algorithm that performs registration of large sets of unstructured point clouds of moving and deforming objects without computing correspondences. Given as input a s...
Niloy J. Mitra, Simon Flöry, Maks Ovsjanikov,...
BMCBI
2010
133views more  BMCBI 2010»
13 years 5 months ago
Predicting enzyme targets for cancer drugs by profiling human Metabolic reactions in NCI-60 cell lines
Background: Drugs can influence the whole metabolic system by targeting enzymes which catalyze metabolic reactions. The existence of interactions between drugs and metabolic react...
Limin Li, Xiaobo Zhou, Wai-Ki Ching, Ping Wang
BMCBI
2005
116views more  BMCBI 2005»
13 years 5 months ago
Dynamic covariation between gene expression and proteome characteristics
Background: Cells react to changing intra- and extracellular signals by dynamically modulating complex biochemical networks. Cellular responses to extracellular signals lead to ch...
Mansour Taghavi Azar Sharabiani, Markku Siermala, ...