Sciweavers

970 search results - page 48 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 1 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
SICHERHEIT
2008
13 years 9 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
NAR
2002
138views more  NAR 2002»
13 years 7 months ago
The Protein Information Resource: an integrated public resource of functional annotation of proteins
The Protein Information Resource (PIR) serves as an integrated public resource of functional annotation of protein data to support genomic/proteomic research and scientific discov...
Cathy H. Wu, Hongzhan Huang, Leslie Arminski, Jorg...
DAGSTUHL
2004
13 years 9 months ago
Requirements for and Design of a Processor with Predictable Timing
Abstract. This paper introduces a set of design principles that aim to make processor architectures amenable to static timing analysis. Based on these principles, we give a design ...
Christoph Berg, Jakob Engblom, Reinhard Wilhelm
BMCBI
2008
144views more  BMCBI 2008»
13 years 8 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath