Sciweavers

100 search results - page 17 / 20
» Controlling Accessibility in Agile Projects with the Access ...
Sort
View
BMCBI
2007
162views more  BMCBI 2007»
13 years 11 months ago
Bioclipse: an open source workbench for chemo- and bioinformatics
Background: There is a need for software applications that provide users with a complete and extensible toolkit for chemo- and bioinformatics accessible from a single workbench. C...
Ola Spjuth, Tobias Helmus, Egon L. Willighagen, St...
BMCBI
2008
130views more  BMCBI 2008»
13 years 11 months ago
Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseas
Background: Millions of single nucleotide polymorphisms have been identified as a result of the human genome project and the rapid advance of high throughput genotyping technology...
Wei Yu, Anja Wulf, Tiebin Liu, Muin J. Khoury, Mar...
DAC
2007
ACM
14 years 11 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
CCS
2009
ACM
14 years 5 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
DRM
2005
Springer
14 years 4 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...