Sciweavers

436 search results - page 54 / 88
» Automating Performance Analysis from Taverna Workflows
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
SIGSOFT
2007
ACM
14 years 8 months ago
Using groupings of static analysis alerts to identify files likely to contain field failures
In this paper, we propose a technique for leveraging historical field failure records in conjunction with automated static analysis alerts to determine which alerts or sets of ale...
Mark Sherriff, Sarah Smith Heckman, J. Michael Lak...
BMCBI
2005
94views more  BMCBI 2005»
13 years 7 months ago
Visualization-based discovery and analysis of genomic aberrations in microarray data
Background: Chromosomal copy number changes (aneuploidies) play a key role in cancer progression and molecular evolution. These copy number changes can be studied using microarray...
Chad L. Myers, Xing Chen, Olga G. Troyanskaya
BMCBI
2005
114views more  BMCBI 2005»
13 years 7 months ago
Systematic analysis of human kinase genes: a large number of genes and alternative splicing events result in functional and stru
Background: Protein kinases are a well defined family of proteins, characterized by the presence of a common kinase catalytic domain and playing a significant role in many importa...
Luciano Milanesi, Mauro Petrillo, Leandra Sepe, An...