Sciweavers

1060 search results - page 179 / 212
» Using an Agile Approach in a Large, Traditional Organization
Sort
View
CCS
2008
ACM
15 years 1 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
IWC
2007
120views more  IWC 2007»
14 years 11 months ago
Visualizing set concordance with permutation matrices and fan diagrams
Scientific problem solving often involves concordance (or discordance) analysis among the result sets from different approaches. For example, different scientific analysis met...
Bo Hyoung Kim, Bongshin Lee, Jinwook Seo
AIR
1998
160views more  AIR 1998»
14 years 11 months ago
Automatic Plankton Image Recognition
Plankton form the base of the food chain in the ocean and are fundamental to marine ecosystem dynamics. The rapid mapping of plankton abundance together with taxonomic and size com...
Xiaoou Tang, W. Kenneth Stewart, He Huang, Scott M...
BMCBI
2008
168views more  BMCBI 2008»
14 years 12 months ago
Predicting protein folding pathways at the mesoscopic level based on native interactions between secondary structure elements
Background: Since experimental determination of protein folding pathways remains difficult, computational techniques are often used to simulate protein folding. Most current techn...
Qingwu Yang, Sing-Hoi Sze
ICASSP
2007
IEEE
15 years 6 months ago
Evolutionary Sequence Modeling for Discovery of Peptide Hormones
There are currently a large number of ‘‘orphan’’ G-protein-coupled receptors (GPCRs) whose endogenous ligands (peptide hormones) are unknown. Identification of these pepti...
M. Kemal Sönmez, Lawrence Toll, Nina Zaveri