Since its inception in 1994, The RNA Modification Database (RNAMDB, http://rna-mdb.cas.albany. edu/RNAmods/) has served as a focal point for information pertaining to naturally oc...
William A. Cantara, Pamela F. Crain, Jef Rozenski,...
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on the Web, we downloaded two sets of Web pages while ...
We introduce a trainable system that simultaneously filters and classifies low-level features into types specified by the user. The system operates over full colour images, and ou...
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
This paper explores the idea that redundant operations, like type errors, commonly flag correctness errors. We experimentally test this idea by writing and applying four redundanc...