Sciweavers

265 search results - page 53 / 53
» Towards building a highly-available cluster based model for ...
Sort
View
CCS
2003
ACM
13 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
JSS
2007
80views more  JSS 2007»
13 years 4 months ago
Feedback control-based dynamic resource management in distributed real-time systems
The resource management in distributed real-time systems becomes increasingly unpredictable with the proliferation of data-driven applications. Therefore, it is inefficient to all...
Tian He, John A. Stankovic, Michael Marley, Chenya...
BMCBI
2007
116views more  BMCBI 2007»
13 years 4 months ago
Cloning, analysis and functional annotation of expressed sequence tags from the Earthworm Eisenia fetida
Background: Eisenia fetida, commonly known as red wiggler or compost worm, belongs to the Lumbricidae family of the Annelida phylum. Little is known about its genome sequence alth...
Mehdi Pirooznia, Ping Gong, Xin Guan, Laura S. Ino...
BMCBI
2007
176views more  BMCBI 2007»
13 years 5 months ago
Genome Expression Pathway Analysis Tool - Analysis and visualization of microarray gene expression data under genomic, proteomic
Background: Regulation of gene expression is relevant to many areas of biology and medicine, in the study of treatments, diseases, and developmental stages. Microarrays can be use...
Markus Weniger, Julia C. Engelmann, Jörg Schu...
ACSAC
2007
IEEE
13 years 11 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda