Sciweavers

4270 search results - page 192 / 854
» A Permutation Approach to Validation
Sort
View
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
15 years 11 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
ICST
2011
IEEE
14 years 8 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
BMCBI
2008
128views more  BMCBI 2008»
15 years 5 months ago
SIGffRid: A tool to search for sigma factor binding sites in bacterial genomes using comparative approach and biologically drive
Background: Many programs have been developed to identify transcription factor binding sites. However, most of them are not able to infer two-word motifs with variable spacer leng...
Fabrice Touzain, Sophie Schbath, Isabelle Debled-R...
BMCBI
2008
88views more  BMCBI 2008»
15 years 5 months ago
Large-scale identification of polymorphic microsatellites using an in silico approach
Background: Simple Sequence Repeat (SSR) or microsatellite markers are valuable for genetic research. Experimental methods to develop SSR markers are laborious, time consuming and...
Jifeng Tang, Samantha J. Baldwin, Jeanne M. E. Jac...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 11 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee