Sciweavers

226 search results - page 38 / 46
» An Investigation of Analysis Techniques for Software Dataset...
Sort
View
STORAGESS
2005
ACM
14 years 3 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
BMCBI
2007
181views more  BMCBI 2007»
13 years 10 months ago
Genes2Networks: connecting lists of gene symbols using mammalian protein interactions databases
Background: In recent years, mammalian protein-protein interaction network databases have been developed. The interactions in these databases are either extracted manually from lo...
Seth I. Berger, Jeremy M. Posner, Avi Ma'ayan
EUROSYS
2008
ACM
14 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ACMSE
2006
ACM
13 years 11 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
VISSYM
2007
14 years 6 days ago
Parametric Visualization of High Resolution Correlated Multi-spectral Features Using PCA
An imaging mass spectrometer is an analytical instrument that can determine the spatial distribution of chemical compounds on complex surfaces. The output of the device is a multi...
Alexander Broersen, Robert van Liere, Ron M. A. He...