Sciweavers

1804 search results - page 294 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
BMCBI
2010
127views more  BMCBI 2010»
14 years 10 months ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
SIGCOMM
2010
ACM
14 years 10 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...
ISOLA
2004
Springer
15 years 3 months ago
Case Studies with Lurette V2
Abstract. Lurette is an automated testing tool dedicated to reactive programs. The test process is automated at two levels: given a formal description of the System Under Test (SUT...
Erwan Jahier, Pascal Raymond, Philippe Baufreton
BMCBI
2010
102views more  BMCBI 2010»
14 years 10 months ago
Missing genes in the annotation of prokaryotic genomes
Background: Protein-coding gene detection in prokaryotic genomes is considered a much simpler problem than in intron-containing eukaryotic genomes. However there have been reports...
Andrew S. Warren, Jeremy S. Archuleta, Wu-chun Fen...
CCS
2007
ACM
15 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...