Sciweavers

1424 search results - page 59 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
BMCBI
2010
116views more  BMCBI 2010»
13 years 8 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
14 years 2 months ago
Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research Program
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individual’s local context can be utilized to redu...
Sukeshini A. Grandhi, Quentin Jones
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
HASE
1998
IEEE
13 years 11 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
WORDS
2003
IEEE
14 years 1 months ago
Using Co-ordinated Atomic Actions for Building Complex Web Applications: A Learning Experience
This paper discusses some of the typical characteristics of modern Web applications and analyses some of the problems the developers of such systems have to face. One of such type...
Avelino F. Zorzo, Panayiotis Periorellis, Alexande...