Sciweavers

935 search results - page 127 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
SEMWEB
2004
Springer
14 years 3 months ago
Bibster - A Semantics-Based Bibliographic Peer-to-Peer System
Abstract. This paper describes the design and implementation of Bibster, a Peer-to-Peer system for exchanging bibliographic data among researchers. Bibster exploits ontologies in d...
Peter Haase, Jeen Broekstra, Marc Ehrig, Maarten M...
BMCBI
2010
135views more  BMCBI 2010»
13 years 10 months ago
Quadratic variance models for adaptively preprocessing SELDI-TOF mass spectrometry data
Background: Surface enhanced laser desorption/ionization time-of-flight mass spectrometry (SELDI) is a proteomics tool for biomarker discovery and other high throughput applicatio...
Vincent A. Emanuele II, Brian M. Gurbaxani
BMCBI
2002
126views more  BMCBI 2002»
13 years 10 months ago
RIO: Analyzing proteomes by automated phylogenomics using resampled inference of orthologs
Background: When analyzing protein sequences using sequence similarity searches, orthologous sequences (that diverged by speciation) are more reliable predictors of a new protein&...
Christian M. Zmasek, Sean R. Eddy
WWW
2011
ACM
13 years 5 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...