Sciweavers

1557 search results - page 268 / 312
» Evolution of Business Processes and a Process Simulation Too...
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 3 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
BMCBI
2010
126views more  BMCBI 2010»
13 years 6 months ago
Systematic integration of experimental data and models in systems biology
Background: The behaviour of biological systems can be deduced from their mathematical models. However, multiple sources of data in diverse forms are required in the construction ...
Peter Li, Joseph O. Dada, Daniel Jameson, Irena Sp...
ISBI
2008
IEEE
14 years 9 months ago
Chromosome pairing for karyotyping purposes using mutual information
Cytogenetics is the preferred tool in the diagnosis of genetic diseases such as leukemia and detection of aquired chromosomal abnormalities, such as translocations, deletions, mon...
Artem Khmelinskii, João Sanches, Rodrigo Ve...
ISW
2007
Springer
14 years 2 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
JIRS
1998
100views more  JIRS 1998»
13 years 8 months ago
Reactive Robots in the Service of Production Management
In this paper, we advocate the use of reactive robots in industrial process control and production management. It is explained why reactive robots are well-suited to modern industr...
Elpida Tzafestas