Sciweavers

35 search results - page 3 / 7
» A method for automatic identification of signatures of stega...
Sort
View
CSMR
2009
IEEE
14 years 2 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
PST
2004
13 years 9 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
BMCBI
2008
108views more  BMCBI 2008»
13 years 7 months ago
Empirical methods for controlling false positives and estimating confidence in ChIP-Seq peaks
Background: High throughput signature sequencing holds many promises, one of which is the ready identification of in vivo transcription factor binding sites, histone modifications...
David A. Nix, Samir J. Courdy, Kenneth M. Boucher
BMCBI
2005
148views more  BMCBI 2005»
13 years 7 months ago
NemaFootPrinter: a web based software for the identification of conserved non-coding genome sequence regions between C. elegans
Background: NemaFootPrinter (Nematode Transcription Factor Scan Through Philogenetic Footprinting) is a web-based software for interactive identification of conserved, non-exonic ...
Davide Rambaldi, Alessandro Guffanti, Paolo Morand...
BMVC
1998
13 years 9 months ago
Writer Identification from Non-uniformly Skewed Handwriting Images
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...