Sciweavers

1356 search results - page 177 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
OSDI
2006
ACM
14 years 8 months ago
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management
Mismanagement of the persistent state of a system--all the executable files, configuration settings and other data that govern how a system functions--causes reliability problems,...
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Bra...
BMCBI
2008
95views more  BMCBI 2008»
13 years 8 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...
BMCBI
2006
142views more  BMCBI 2006»
13 years 8 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
DAS
2006
Springer
13 years 11 months ago
Exploratory Analysis System for Semi-structured Engineering Logs
Engineering diagnosis often involves analyzing complex records of system states printed to large, textual log files. Typically the logs are designed to accommodate the widest debug...
Michael Flaster, Bruce Hillyer, Tin Kam Ho