Sciweavers

1804 search results - page 223 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
108
Voted
ETFA
2008
IEEE
15 years 10 months ago
Two camera system for robot applications; navigation
Current approaches to feature detection and matching in images strive to increase the repeatability of the detector and minimize the degree of outliers in the matching. In this pa...
Jörgen Lidholm, Fredrik Ekstrand, Lars Asplun...
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
BMCBI
2008
151views more  BMCBI 2008»
15 years 4 months ago
Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs
Background: Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes...
Hiroyuki Mishima, Andrew C. Lidral, Jun Ni
BMCBI
2007
95views more  BMCBI 2007»
15 years 4 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 2 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone