Sciweavers

626 search results - page 120 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
BMCBI
2006
182views more  BMCBI 2006»
13 years 7 months ago
A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for Drosophila
Background: Biological processes are mediated by networks of interacting genes and proteins. Efforts to map and understand these networks are resulting in the proliferation of int...
Svetlana Pacifico, Guozhen Liu, Stephen Guest, Jod...
BMCBI
2010
162views more  BMCBI 2010»
13 years 7 months ago
SNP-RFLPing 2: an updated and integrated PCR-RFLP tool for SNP genotyping
Background: PCR-restriction fragment length polymorphism (RFLP) assay is a cost-effective method for SNP genotyping and mutation detection, but the manual mining for restriction e...
Hsueh-Wei Chang, Yu-Huei Cheng, Li-Yeh Chuang, Che...
MOBIHOC
2007
ACM
14 years 7 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
ACSAC
2007
IEEE
14 years 2 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
OOPSLA
2010
Springer
13 years 6 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu