Sciweavers

188 search results - page 29 / 38
» A Linear Genetic Programming Approach to Intrusion Detection
Sort
View
CSFW
2007
IEEE
14 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
SIMULATION
1998
177views more  SIMULATION 1998»
13 years 9 months ago
Simulation and Planning of an Intermodal Container Terminal
A decision support system for the management of an intermodal container terminal is presented. Among the problems to be solved, there are the spatial allocation of containers on t...
Luca Maria Gambardella, Andrea Emilio Rizzoli, Mar...
BMCBI
2007
165views more  BMCBI 2007»
13 years 9 months ago
Ab initio identification of human microRNAs based on structure motifs
Background: MicroRNAs (miRNAs) are short, non-coding RNA molecules that are directly involved in post-transcriptional regulation of gene expression. The mature miRNA sequence bind...
Markus Brameier, Carsten Wiuf
BMCBI
2007
106views more  BMCBI 2007»
13 years 10 months ago
Mining prokaryotic genomes for unknown amino acids: a stop-codon-based approach
Background: Selenocysteine and pyrrolysine are the 21st and 22nd amino acids, which are genetically encoded by stop codons. Since a number of microbial genomes have been completel...
Masashi Fujita, Hisaaki Mihara, Susumu Goto, Nobuy...
GECCO
2008
Springer
239views Optimization» more  GECCO 2008»
13 years 11 months ago
Multiobjective design of operators that detect points of interest in images
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...