Sciweavers

534 search results - page 103 / 107
» Effectively Visualizing Large Networks Through Sampling
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
BMCBI
2010
214views more  BMCBI 2010»
13 years 7 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper
CONEXT
2008
ACM
13 years 9 months ago
Peer-assisted content distribution with prices
Peer-assisted content distribution matches user demand for content with available supply at other peers in the network. Inspired by this supply-and-demand interpretation of the na...
Christina Aperjis, Michael J. Freedman, Ramesh Joh...
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 7 months ago
Efficient Route Tracing from a Single Source
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as a...
Benoit Donnet, Philippe Raoult, Timur Friedman
BIOINFORMATICS
2008
203views more  BIOINFORMATICS 2008»
13 years 7 months ago
The SGN comparative map viewer
Background: A common approach to understanding the genetic basis of complex traits is through identification of associated quantitative trait loci (QTL). Fine mapping QTLs require...
Lukas A. Mueller, Adri A. Mills, Beth Skwarecki, R...