Sciweavers

937 search results - page 150 / 188
» Positive Active XML
Sort
View
DIMVA
2009
14 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
BMCBI
2010
97views more  BMCBI 2010»
14 years 9 months ago
Incorporating significant amino acid pairs to identify O-linked glycosylation sites on transmembrane proteins and non-transmembr
Background: While occurring enzymatically in biological systems, O-linked glycosylation affects protein folding, localization and trafficking, protein solubility, antigenicity, bi...
Shu-An Chen, Tzong-Yi Lee, Yu-Yen Ou
BC
2006
80views more  BC 2006»
14 years 9 months ago
Sparse Spatial Sampling for the Computation of Motion in Multiple Stages
The avian retino-tecto-rotundal pathway plays a central role in motion analysis and features complex connectivity. Yet, the relation between the pathway's structural arrangeme...
Alireza S. Mahani, Reza Khanbabaie, Harald Luksch,...
CSDA
2006
122views more  CSDA 2006»
14 years 9 months ago
The fuzzy approach to statistical analysis
For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are:...
Renato Coppi, María Angeles Gil, Henk A. L....
FUIN
2006
107views more  FUIN 2006»
14 years 9 months ago
Learning Sunspot Classification
Sunspots are the subject of interest to many astronomers and solar physicists. Sunspot observation, analysis and classification form an important part of furthering the knowledge a...
Trung Thanh Nguyen, Claire P. Willis, Derek J. Pad...