Sciweavers

1687 search results - page 139 / 338
» Which pointer analysis should I use
Sort
View
CCS
2008
ACM
15 years 6 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
147
Voted
BMCBI
2007
154views more  BMCBI 2007»
15 years 4 months ago
Cinteny: flexible analysis and visualization of synteny and genome rearrangements in multiple organisms
Background: Identifying syntenic regions, i.e., blocks of genes or other markers with evolutionary conserved order, and quantifying evolutionary relatedness between genomes in ter...
Amit U. Sinha, Jaroslaw Meller
IPM
2007
145views more  IPM 2007»
15 years 4 months ago
Text mining techniques for patent analysis
Patent documents contain important research results. However, they are lengthy and rich in technical terminology such that it takes a lot of human efforts for analyses. Automatic...
Yuen-Hsien Tseng, Chi-Jen Lin, Yu-I Lin
129
Voted
BMCBI
2006
178views more  BMCBI 2006»
15 years 4 months ago
Correlation analysis of two-dimensional gel electrophoretic protein patterns and biological variables
Background: Two-dimensional gel electrophoresis (2DE) is a powerful technique to examine post-translational modifications of complexly modulated proteins. Currently, spot detectio...
Werner W. V. B. Van Belle, Nina N. A. Anensen, Ing...
UAI
2004
15 years 5 months ago
Graph Partition Strategies for Generalized Mean Field Inference
An autonomous variational inference algorithm for arbitrary graphical models requires the ability to optimize variational approximations over the space of model parameters as well...
Eric P. Xing, Michael I. Jordan