Sciweavers

303 search results - page 57 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
BMCBI
2008
90views more  BMCBI 2008»
13 years 7 months ago
Genome-scale study of the importance of binding site context for transcription factor binding and gene regulation
Background: The rate of mRNA transcription is controlled by transcription factors that bind to specific DNA motifs in promoter regions upstream of protein coding genes. Recent res...
Jakub Orzechowski Westholm, Feifei Xu, Hans Ronne,...
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CGF
1998
213views more  CGF 1998»
13 years 7 months ago
Interactive Construction and Animation of Layered Elastically Deformable Characters
An interactive system is described for creating and animating deformable 3D characters. By using a hybrid layered model of kinematic and physics-based components together with an ...
Russell Turner, Enrico Gobbetti
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 2 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh