Sciweavers

1804 search results - page 255 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
BMCBI
2007
183views more  BMCBI 2007»
14 years 10 months ago
Considerations in the identification of functional RNA structural elements in genomic alignments
Background: Accurate identification of novel, functional noncoding (nc) RNA features in genome sequence has proven more difficult than for exons. Current algorithms identify and s...
Tomas Babak, Benjamin J. Blencowe, Timothy R. Hugh...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Wireless Sensor Networks for Health Monitoring
We propose a platform for health monitoring using wireless sensor networks. Our platform is a new architecture called CustoMed that will reduce the customization and reconfigurat...
Roozbeh Jafari, Andre Encarnacao, Azad Zahoory, Fo...
BIOINFORMATICS
2008
97views more  BIOINFORMATICS 2008»
14 years 10 months ago
An integrated system for studying residue coevolution in proteins
Residue coevolution has recently emerged as an important concept, especially in the context of protein structures. While a multitude of different functions for quantifying it have...
Kevin Y. Yip, Prianka Patel, Philip M. Kim, Donald...
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 2 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
ICCD
2006
IEEE
113views Hardware» more  ICCD 2006»
15 years 7 months ago
A theory of Error-Rate Testing
— We have entered an era where chip yields are decreasing with scaling. A new concept called intelligible testing has been previously proposed with the goal of reversing this tre...
Shideh Shahidi, Sandeep Gupta