Sciweavers

1804 search results - page 266 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ACSD
2003
IEEE
151views Hardware» more  ACSD 2003»
15 years 8 months ago
Communicating Transaction Processes
Message Sequence Charts (MSC) have been traditionally used to depict execution scenarios in the early stages of design cycle. MSCs portray inter-process ( inter-object) interactio...
Abhik Roychoudhury, P. S. Thiagarajan
123
Voted
BMCBI
2010
113views more  BMCBI 2010»
15 years 3 months ago
Statistical method on nonrandom clustering with application to somatic mutations in cancer
Background: Human cancer is caused by the accumulation of tumor-specific mutations in oncogenes and tumor suppressors that confer a selective growth advantage to cells. As a conse...
Jingjing Ye, Adam Pavlícek, Elizabeth A. Lu...
BMCBI
2005
179views more  BMCBI 2005»
15 years 3 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...
ICASSP
2010
IEEE
15 years 3 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
ICTAC
2009
Springer
15 years 1 months ago
Integration Testing from Structured First-Order Specifications via Deduction Modulo
Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large s...
Delphine Longuet, Marc Aiguier