Sciweavers

758 search results - page 60 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
JSAC
2010
113views more  JSAC 2010»
13 years 8 months ago
On counteracting Byzantine attacks in network coded peer-to-peer networks
Abstract—Random linear network coding can be used in peerto-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are ...
MinJi Kim, Luísa Lima, Fang Zhao, Joã...
EUROSYS
2009
ACM
14 years 7 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
BMCBI
2005
152views more  BMCBI 2005»
13 years 9 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
TON
2012
12 years 12 days ago
Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
—Regular expressions (RegExes) are widely used, yet their inherent complexity often limits the total number of RegExes that can be detected using a single chip for a reasonable t...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
BMCBI
2006
114views more  BMCBI 2006»
13 years 10 months ago
BLISS: biding site level identification of shared signal-modules in DNA regulatory sequences
Background: Regulatory modules are segments of the DNA that control particular aspects of gene expression. Their identification is therefore of great importance to the field of mo...
Hailong Meng, Arunava Banerjee, Lei Zhou