Sciweavers

16070 search results - page 239 / 3214
» Identifying
Sort
View
ESORICS
2006
Springer
15 years 9 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
GECCO
2010
Springer
163views Optimization» more  GECCO 2010»
15 years 9 months ago
Factors affecting the use of genetic algorithms in test suite augmentation
Test suite augmentation techniques are used in regression testing to help engineers identify code elements affected by changes, and generate test cases to cover those elements. R...
Zhihong Xu, Myra B. Cohen, Gregg Rothermel
EGOV
2009
Springer
15 years 8 months ago
Profiling the EG Research Community and Its Core
Electronic Government Research (EGR) has progressed beyond its stages of infancy and has unfolded into a respected domain of multi- and crossdisciplinary study. A sizable and dedic...
Hans Jochen Scholl
ISMB
2007
15 years 7 months ago
Computational prediction of host-pathogen protein-protein interactions
Our major effort in this reporting period comprised functional genomic studies of key genes for carbon metabolite and nodulation/nitrogen fixation in Sinorhizobium meliloti, compar...
Matthew D. Dyer, T. M. Murali, Bruno W. S. Sobral
ASWEC
2008
IEEE
15 years 7 months ago
Root Cause Analysis Using Sequence Alignment and Latent Semantic Indexing
Automatic identification of software faults has enormous practical significance. This requires characterizing program execution behavior. Equally important is the aspect of diagno...
R. P. Jagadeesh Chandra Bose, U. Suresh