Sciweavers

98 search results - page 19 / 20
» Evaluating Sampling Based Hotspot Detection
Sort
View
88
Voted
BMCBI
2006
134views more  BMCBI 2006»
14 years 9 months ago
A statistical score for assessing the quality of multiple sequence alignments
Background: Multiple sequence alignment is the foundation of many important applications in bioinformatics that aim at detecting functionally important regions, predicting protein...
Virpi Ahola, Tero Aittokallio, Mauno Vihinen, Esa ...
79
Voted
USENIX
2007
14 years 12 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
JCB
2008
91views more  JCB 2008»
14 years 9 months ago
Computational Quantification of Peptides from LC-MS Data
Liquid chromatography coupled to mass spectrometry (LC-MS) has become a major tool for the study of biological processes. High-throughput LC-MS experiments are frequently conducte...
Ole Schulz-Trieglaff, Rene Hussong, Clemens Gr&oum...
WSC
2000
14 years 11 months ago
A comparison of five steady-state truncation heuristics for simulation
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...