Sciweavers

520 search results - page 54 / 104
» Computing recombination networks from binary sequences
Sort
View
RECOMB
2007
Springer
15 years 10 months ago
A Feature-Based Approach to Modeling Protein-DNA Interactions
Transcription factor (TF) binding to its DNA target site is a fundamental regulatory interaction. The most common model used to represent TF binding specificities is a position spe...
Eilon Sharon, Eran Segal
NAR
2011
212views Computer Vision» more  NAR 2011»
14 years 20 days ago
Phospho.ELM: a database of phosphorylation sites - update 2011
The Phospho.ELM resource (http://phospho.elm.eu .org) is a relational database designed to store in vivo and in vitro phosphorylation data extracted from the scientific literature...
Holger Dinkel, Claudia Chica, Allegra Via, Cathryn...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 4 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
AINA
2007
IEEE
15 years 1 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
NDSS
2008
IEEE
15 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...