Sciweavers

417 search results - page 73 / 84
» Detecting Fault Modules Using Bioinformatics Techniques
Sort
View
JSS
2011
103views more  JSS 2011»
12 years 9 months ago
XML-manipulating test case prioritization for XML-manipulating services
: A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors are compatible with its original col...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
BMCBI
2007
145views more  BMCBI 2007»
13 years 6 months ago
Colony size measurement of the yeast gene deletion strains for functional genomics
Background: Numerous functional genomics approaches have been developed to study the model organism yeast, Saccharomyces cerevisiae, with the aim of systematically understanding t...
Negar Memarian, Matthew Jessulat, Javad Alirezaie,...
GI
2003
Springer
13 years 12 months ago
Evaluation of Thread-Based Virtual Duplex Systems in Embedded Environments
: Virtual duplex systems have emerged as an alternative to traditional duplex systems, trading structural for temporal redundancy. When used in dependable embedded systems, virtual...
Jörg Keller, Andreas Grävinghoff
PST
2004
13 years 8 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
ESORICS
2010
Springer
13 years 7 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....