Sciweavers

274 search results - page 46 / 55
» Improving vulnerability discovery models
Sort
View
BMCBI
2006
103views more  BMCBI 2006»
13 years 7 months ago
Cis-motifs upstream of the transcription and translation initiation sites are effectively revealed by their positional disequili
Background: The discovery of cis-regulatory motifs still remains a challenging task even though the number of sequenced genomes is constantly growing. Computational analyses using...
Kenneth W. Berendzen, Kurt Stüber, Klaus Hart...
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
13 years 5 months ago
The Flexible Climate Data Analysis Tools (CDAT) for Multi-model Climate Simulation Data
Being able to incorporate, inspect, and analyze data with newly developed technologies, diagnostics, and visualizations in an easy and flexible way has been a longstanding challen...
Dean N. Williams, Charles M. Doutriaux, Robert S. ...
USS
2008
13 years 10 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
DEBU
2008
100views more  DEBU 2008»
13 years 7 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...