Sciweavers

787 search results - page 154 / 158
» Source code analysis and manipulation
Sort
View
CCS
2005
ACM
15 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
15 years 1 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
BIOINFORMATICS
2008
97views more  BIOINFORMATICS 2008»
14 years 9 months ago
An integrated system for studying residue coevolution in proteins
Residue coevolution has recently emerged as an important concept, especially in the context of protein structures. While a multitude of different functions for quantifying it have...
Kevin Y. Yip, Prianka Patel, Philip M. Kim, Donald...
BIOINFORMATICS
2007
195views more  BIOINFORMATICS 2007»
14 years 9 months ago
Context-dependent clustering for dynamic cellular state modeling of microarray gene expression
Motivation: High-throughput expression profiling allows researchers to study gene activities globally. Genes with similar expression profiles are likely to encode proteins that ma...
Shinsheng Yuan, Ker-Chau Li
BMCBI
2010
156views more  BMCBI 2010»
14 years 9 months ago
PeakAnalyzer: Genome-wide annotation of chromatin binding and modification loci
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...