Sciweavers

78 search results - page 13 / 16
» Comparative Analysis of Technical Methods for Detecting Soft...
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
OOPSLA
2007
Springer
14 years 4 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley
BMCBI
2007
173views more  BMCBI 2007»
13 years 10 months ago
Ringo - an R/Bioconductor package for analyzing ChIP-chip readouts
Background: Chromatin immunoprecipitation combined with DNA microarrays (ChIP-chip) is a high-throughput assay for DNA-protein-binding or post-translational chromatin/histone modi...
Joern Toedling, Oleg Sklyar, Tammo Krueger, Jenny ...
DSN
2004
IEEE
14 years 2 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
BMCBI
2005
123views more  BMCBI 2005»
13 years 10 months ago
PSI-BLAST-ISS: an intermediate sequence search tool for estimation of the position-specific alignment reliability
Background: Protein sequence alignments have become indispensable for virtually any evolutionary, structural or functional study involving proteins. Modern sequence search and com...
Mindaugas Margelevicius, Ceslovas Venclovas