Sciweavers

302 search results - page 61 / 61
» Asymptotic performance of distributed detection over random ...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
BMCBI
2010
135views more  BMCBI 2010»
13 years 7 months ago
Delineation of amplification, hybridization and location effects in microarray data yields better-quality normalization
Background: Oligonucleotide arrays have become one of the most widely used high-throughput tools in biology. Due to their sensitivity to experimental conditions, normalization is ...
Marc Hulsman, Anouk Mentink, Eugene P. van Someren...