Sciweavers

1356 search results - page 194 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2008
126views more  BMCBI 2008»
13 years 8 months ago
Relating gene expression data on two-component systems to functional annotations in Escherichia coli
Background: Obtaining physiological insights from microarray experiments requires computational techniques that relate gene expression data to functional information. Traditionall...
Anne M. Denton, Jianfei Wu, Megan K. Townsend, Pre...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
BMCBI
2007
146views more  BMCBI 2007»
13 years 8 months ago
Spatial location and its relevance for terminological inferences in bio-ontologies
Background: An adequate and expressive ontological representation of biological organisms and their parts requires formal reasoning mechanisms for their relations of physical aggr...
Stefan Schulz, Kornél G. Markó, Udo ...
CCS
2008
ACM
13 years 10 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
TEI
2010
ACM
144views Hardware» more  TEI 2010»
14 years 2 months ago
Tangible jukebox: back to palpable music
Since commercial musical recordings became available about a century ago and until very recently, they had always been distributed by means of a physical support. Nowadays that re...
Daniel Gallardo, Sergi Jordà