Sciweavers

4934 search results - page 943 / 987
» complexity 2008
Sort
View
139
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
BIBE
2008
IEEE
142views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Optimizing performance, cost, and sensitivity in pairwise sequence search on a cluster of PlayStations
— The Smith-Waterman algorithm is a dynamic programming method for determining optimal local alignments between nucleotide or protein sequences. However, it suffers from quadrati...
Ashwin M. Aji, Wu-chun Feng
BIBM
2008
IEEE
107views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
A Functional Network of Yeast Genes Using Gene Ontology Information
In the post-genomic era, the organization of genes into networks has played an important role in characterizing the functions of individual genes and the interplay between them. I...
Erliang Zeng, Giri Narasimhan, Lisa Schneper, Kala...
123
Voted
C5
2008
IEEE
15 years 10 months ago
Toward A More Scalable End-User Scripting Language
End-user scripting languages are relatively easy to learn, but have limited expressive power. Tile-based scripting systems are particularly accessible to beginners, but usually ar...
Alessandro Warth, Takashi Yamamiya, Yoshiki Ohshim...