Sciweavers

16070 search results - page 199 / 3214
» Identifying
Sort
View
113
Voted
BMCBI
2006
106views more  BMCBI 2006»
15 years 4 months ago
Improving the performance of DomainDiscovery of protein domain boundary assignment using inter-domain linker index
Background: Knowledge of protein domain boundaries is critical for the characterisation and understanding of protein function. The ability to identify domains without the knowledg...
Abdur R. Sikder, Albert Y. Zomaya
PERCOM
2008
ACM
15 years 4 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
TCAD
2008
118views more  TCAD 2008»
15 years 4 months ago
CHIPS: Custom Hardware Instruction Processor Synthesis
This paper describes an integer-linear-programming (ILP)-based system called Custom Hardware Instruction Processor Synthesis (CHIPS) that identifies custom instructions for critica...
Kubilay Atasu, Can C. Özturan, Günhan D&...
CANDC
2005
ACM
15 years 4 months ago
Latent periodicity of serine-threonine and tyrosine protein kinases and other protein families
We identified latent periodicity in catalytic domains of approximately 85% of annotated serine
Andrew A. Laskin, Nikolay A. Kudryashov, Konstanti...
214
Voted
WCRE
2010
IEEE
15 years 3 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel