Sciweavers

188 search results - page 21 / 38
» Injectivity analysis using interval analysis: Application to...
Sort
View
139
Voted
ACSC
2007
IEEE
15 years 7 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
116
Voted
ICWE
2003
Springer
15 years 8 months ago
Morphoanalysis of Spanish Texts: Two Applications for Web Pages
The applications described here follow up the works performed in the recent last years by the Data Structures and Computational Linguistics Group at Las Palmas de Gran Canaria Univ...
Octavio Santana Suárez, Zenón Jos&ea...
BMCBI
2004
142views more  BMCBI 2004»
15 years 3 months ago
GOTree Machine (GOTM): a web-based platform for interpreting sets of interesting genes using Gene Ontology hierarchies
Background: Microarray and other high-throughput technologies are producing large sets of interesting genes that are difficult to analyze directly. Bioinformatics tools are needed...
Bing Zhang, Denise Schmoyer, Stefan Kirov, Jay Sno...
ADBIS
2007
Springer
145views Database» more  ADBIS 2007»
15 years 9 months ago
A Method for Comparing Self-organizing Maps: Case Studies of Banking and Linguistic Data
The method of self-organizing maps (SOM) is a method of exploratory data analysis used for clustering and projecting multi-dimensional data into a lower-dimensional space to reveal...
Toomas Kirt, Ene Vainik, Leo Vohandu
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 9 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...