Sciweavers

438 search results - page 50 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
IFIP11
2004
114views Business» more  IFIP11 2004»
13 years 9 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
ENTCS
2006
140views more  ENTCS 2006»
13 years 7 months ago
Stochastic Ambient Calculus
Mobile Ambients (MA) have acquired a fundamental role in modelling mobility in systems with mobile code and mobile devices, and in computation over administrative domains. We pres...
Maria Grazia Vigliotti, Peter G. Harrison
BMCBI
2008
96views more  BMCBI 2008»
13 years 7 months ago
Use of normalization methods for analysis of microarrays containing a high degree of gene effects
Background: High-throughput microarrays are widely used to study gene expression across tissues and developmental stages. Analysis of gene expression data is challenging in these ...
Terri T. Ni, William J. Lemon, Yu Shyr, Tao P. Zho...
ICSM
2009
IEEE
14 years 2 months ago
Understanding source package organization using the hybrid model
Within a large, object-oriented software system it is common to partition the classes into a set of packages, which implicitly serve as a set of coarsely-grained logical design un...
Xinyi Dong, Michael W. Godfrey
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum