Sciweavers

335 search results - page 64 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
BMCBI
2008
144views more  BMCBI 2008»
13 years 7 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath
SASO
2007
IEEE
14 years 1 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
ISCAS
2006
IEEE
133views Hardware» more  ISCAS 2006»
14 years 1 months ago
A psychiatric patients tracking system
This paper presents an RFID based psychiatric critical to psychiatric patient treatment. The work oftracking patient tracking system in a psychiatric patient care center. In psychi...
Ming-Hua Tsai, Chieh-Ling Huang, Pau-Choo Chung, Y...
BMCBI
2008
105views more  BMCBI 2008»
13 years 7 months ago
SIGMA2: A system for the integrative genomic multi-dimensional analysis of cancer genomes, epigenomes, and transcriptomes
Background: High throughput microarray technologies have afforded the investigation of genomes, epigenomes, and transcriptomes at unprecedented resolution. However, software packa...
Raj Chari, Bradley P. Coe, Craig Wedseltoft, Marie...
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...