Sciweavers

610 search results - page 77 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
153
Voted
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
156
Voted
ICPPW
2009
IEEE
15 years 1 months ago
A Scalable Parallel Approach for Peptide Identification from Large-Scale Mass Spectrometry Data
Identifying peptides, which are short polymeric chains of amino acid residues in a protein sequence, is of fundamental importance in systems biology research. The most popular appr...
Gaurav Ramesh Kulkarni, Ananth Kalyanaraman, Willi...
134
Voted
BMCBI
2008
171views more  BMCBI 2008»
15 years 3 months ago
Fuzzy association rules for biological data analysis: A case study on yeast
Background: Last years' mapping of diverse genomes has generated huge amounts of biological data which are currently dispersed through many databases. Integration of the info...
Francisco J. Lopez, Armando Blanco, Fernando Garci...
134
Voted
ICNP
2006
IEEE
15 years 9 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
188
Voted
AGTIVE
2007
Springer
15 years 7 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe