Sciweavers

569 search results - page 86 / 114
» An Empirical Study of Structural Constraint Solving Techniqu...
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TCBB
2008
126views more  TCBB 2008»
13 years 7 months ago
Graphical Models of Residue Coupling in Protein Families
Abstract-- Many statistical measures and algorithmic techniques have been proposed for studying residue coupling in protein families. Generally speaking, two residue positions are ...
John Thomas, Naren Ramakrishnan, Chris Bailey-Kell...
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
13 years 11 months ago
Genetic programming for human oral bioavailability of drugs
Automatically assessing the value of bioavailability from the chemical structure of a molecule is a very important issue in biomedicine and pharmacology. In this paper, we present...
Francesco Archetti, Stefano Lanzeni, Enza Messina,...
WISE
2005
Springer
14 years 1 months ago
Identifying Value Mappings for Data Integration: An Unsupervised Approach
The Web is a distributed network of information sources where the individual sources are autonomously created and maintained. Consequently, syntactic and semantic heterogeneity of ...
Jaewoo Kang, Dongwon Lee, Prasenjit Mitra
EDO
2005
Springer
14 years 1 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...