Sciweavers

1929 search results - page 284 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
MM
2003
ACM
94views Multimedia» more  MM 2003»
15 years 9 months ago
The video paper multimedia playback system
Video Paper is a prototype system for multimedia browsing, analysis, and replay. Key frames extracted from a video recording are printed on paper together with bar codes that allo...
Jamey Graham, Berna Erol, Jonathan J. Hull, Dar-Sh...
CCS
2007
ACM
15 years 10 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
BMCBI
2010
171views more  BMCBI 2010»
15 years 4 months ago
PyMix - The Python mixture package - a tool for clustering of heterogeneous biological data
Background: Cluster analysis is an important technique for the exploratory analysis of biological data. Such data is often high-dimensional, inherently noisy and contains outliers...
Benjamin Georgi, Ivan Gesteira Costa, Alexander Sc...
BMCBI
2010
193views more  BMCBI 2010»
15 years 4 months ago
Probe set filtering increases correlation between Affymetrix GeneChip and qRT-PCR expression measurements
Background: Affymetrix GeneChip microarrays are popular platforms for expression profiling in two types of studies: detection of differential expression computed by p-values of t-...
Jakub Mieczkowski, Magdalena E. Tyburczy, Michal D...