Sciweavers

88 search results - page 14 / 18
» The effectiveness of source code obfuscation: An experimenta...
Sort
View
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 1 days ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
BMCBI
2010
165views more  BMCBI 2010»
14 years 11 months ago
Bayesian integrated modeling of expression data: a case study on RhoG
Background: DNA microarrays provide an efficient method for measuring activity of genes in parallel and even covering all the known transcripts of an organism on a single array. T...
Rashi Gupta, Dario Greco, Petri Auvinen, Elja Arja...
BMCBI
2007
88views more  BMCBI 2007»
14 years 11 months ago
Computational analysis of the relationship between allergenicity and digestibility of allergenic proteins in simulated gastric f
Background: Safety assessment of genetically modified (GM) food, with regard to allergenic potential of transgene-encoded xenoproteins, typically involves several different method...
Bingjun Jiang, Hong Qu, Yuanlei Hu, Ting Ni, Zhong...
92
Voted
BMCBI
2006
100views more  BMCBI 2006»
14 years 11 months ago
Empirical array quality weights in the analysis of microarray data
Background: Assessment of array quality is an essential step in the analysis of data from microarray experiments. Once detected, less reliable arrays are typically excluded or &qu...
Matthew E. Ritchie, Dileepa S. Diyagama, Jody Neil...
SIGSOFT
2005
ACM
16 years 11 days ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard