Sciweavers

1548 search results - page 168 / 310
» Estimating Software Vulnerabilities
Sort
View
RECOMB
2012
Springer
13 years 2 months ago
A Model for Biased Fractionation after Whole Genome Duplication
Background: Paralog reduction, the loss of duplicate genes after whole genome duplication (WGD) is a pervasive process. Whether this loss proceeds gene by gene or through deletion...
David Sankoff, Chunfang Zheng, Baoyong Wang
BMCBI
2005
93views more  BMCBI 2005»
14 years 11 months ago
Computing expectation values for RNA motifs using discrete convolutions
Background: Computational biologists use Expectation values (E-values) to estimate the number of solutions that can be expected by chance during a database scan. Here we focus on ...
André Lambert, Matthieu Legendre, Jean-Fred...
IWPC
2006
IEEE
15 years 5 months ago
Digging the Development Dust for Refactorings
Software repositories are rich sources of information about the software development process. Mining the information stored in them has been shown to provide interesting insights ...
Curtis Schofield, Brendan Tansey, Zhenchang Xing, ...
EUROSYS
2010
ACM
15 years 8 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
EUROSYS
2008
ACM
15 years 8 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos