Sciweavers

188 search results - page 33 / 38
» A Linear Genetic Programming Approach to Intrusion Detection
Sort
View
VLSID
2007
IEEE
126views VLSI» more  VLSID 2007»
14 years 9 months ago
An ECO Technique for Removing Crosstalk Violations in Clock Networks
Crosstalk noise in the clock network of digital circuits is often detected late in the design cycle, sometimes as late as after first silicon. It is therefore necessary to fix cros...
Amit Kumar, Krishnendu Chakrabarty, Chunduri Rama ...
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
BMCBI
2004
150views more  BMCBI 2004»
13 years 8 months ago
SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters
Background: Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a u...
Chunlin Wang, Elliot J. Lefkowitz
RECOMB
2005
Springer
14 years 8 months ago
Causal Inference of Regulator-Target Pairs by Gene Mapping of Expression Phenotypes
Background: Correlations between polymorphic markers and observed phenotypes provide the basis for mapping traits in quantitative genetics. When the phenotype is gene expression, ...
David Kulp, Manjunatha Jagalur
BMCBI
2010
162views more  BMCBI 2010»
13 years 6 months ago
SNPexp - A web tool for calculating and visualizing correlation between HapMap genotypes and gene expression levels
Background: Expression levels for 47294 transcripts in lymphoblastoid cell lines from all 270 HapMap phase II individuals, and genotypes (both HapMap phase II and III) of 3.96 mil...
Kristian Holm, Espen Melum, Andre Franke, Tom H. K...