Sciweavers

3686 search results - page 188 / 738
» Comprehensive comprehensions
Sort
View
ACSAC
2009
IEEE
14 years 1 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
BMCBI
2010
112views more  BMCBI 2010»
13 years 9 months ago
Knowledge-based analysis of microarrays for the discovery of transcriptional regulation relationships
Background: The large amount of high-throughput genomic data has facilitated the discovery of the regulatory relationships between transcription factors and their target genes. Wh...
Junhee Seok, Amit Kaushal, Ronald W. Davis, Wenzho...
BMCBI
2007
163views more  BMCBI 2007»
13 years 9 months ago
Strainer: software for analysis of population variation in community genomic datasets
Background: Metagenomic analyses of microbial communities that are comprehensive enough to provide multiple samples of most loci in the genomes of the dominant organism types will...
John M. Eppley, Gene W. Tyson, Wayne M. Getz, Jill...
BMCBI
2006
182views more  BMCBI 2006»
13 years 9 months ago
A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for Drosophila
Background: Biological processes are mediated by networks of interacting genes and proteins. Efforts to map and understand these networks are resulting in the proliferation of int...
Svetlana Pacifico, Guozhen Liu, Stephen Guest, Jod...