Sciweavers

240 search results - page 46 / 48
» From fingerprint to writeprint
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 1 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ACSAC
2004
IEEE
14 years 1 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
MOBISYS
2010
ACM
14 years 4 days ago
MoVi: mobile phone based video highlights via collaborative sensing
Sensor networks have been conventionally defined as a network of sensor motes that collaboratively detect events and report them to a remote monitoring station. This paper makes a...
Xuan Bao, Romit Roy Choudhury
BMCBI
2010
169views more  BMCBI 2010»
13 years 10 months ago
eCOMPAGT integrates mtDNA: import, validation and export of mitochondrial DNA profiles for population genetics, tumour dynamics
Background: Mitochondrial DNA (mtDNA) is widely being used for population genetics, forensic DNA fingerprinting and clinical disease association studies. The recent past has uncov...
Hansi Weißensteiner, Sebastian Schönher...
BMCBI
2007
139views more  BMCBI 2007»
13 years 10 months ago
Bioinformatics analysis of the early inflammatory response in a rat thermal injury model
Background: Thermal injury is among the most severe forms of trauma and its effects are both local and systemic. Response to thermal injury includes cellular protection mechanisms...
Eric Yang, Timothy Maguire, Martin L. Yarmush, Fra...