Sciweavers

209 search results - page 41 / 42
» Evaluating the performance of user-space and kernel-space we...
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 1 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
BMCBI
2008
121views more  BMCBI 2008»
13 years 6 months ago
ReAlignerV: Web-based genomic alignment tool with high specificity and robustness estimated by species-specific insertion sequen
Background: Detecting conserved noncoding sequences (CNSs) across species highlights the functional elements. Alignment procedures combined with computational prediction of transc...
Hisakazu Iwama, Yukio Hori, Kensuke Matsumoto, Koj...
SIGSOFT
2010
ACM
13 years 4 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
ASWEC
2006
IEEE
14 years 10 days ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
BMCBI
2007
147views more  BMCBI 2007»
13 years 6 months ago
Improved residue contact prediction using support vector machines and a large feature set
Background: Predicting protein residue-residue contacts is an important 2D prediction task. It is useful for ab initio structure prediction and understanding protein folding. In s...
Jianlin Cheng, Pierre Baldi