Sciweavers

330 search results - page 59 / 66
» Instruction Set Limitation in Support of Software Diversity
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
ALMOB
2006
155views more  ALMOB 2006»
13 years 7 months ago
A phylogenetic generalized hidden Markov model for predicting alternatively spliced exons
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...
Jonathan E. Allen, Steven L. Salzberg
BMCBI
2006
120views more  BMCBI 2006»
13 years 7 months ago
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Background: In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. ...
Arnim Jenett, Johannes E. Schindelin, Martin Heise...
ACSAC
2005
IEEE
14 years 1 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
APCCM
2008
13 years 9 months ago
Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages
The work presented in this paper targets the software integration on the level of business process models. The goal is to create the behavioural description of an integrated syste...
Georg Grossmann, Michael Schrefl, Markus Stumptner