Sciweavers

1804 search results - page 329 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
BMCBI
2007
159views more  BMCBI 2007»
13 years 8 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...
BMCBI
2005
157views more  BMCBI 2005»
13 years 8 months ago
Statistical Viewer: a tool to upload and integrate linkage and association data as plots displayed within the Ensembl genome bro
Background: To facilitate efficient selection and the prioritization of candidate complex disease susceptibility genes for association analysis, increasingly comprehensive annotat...
Judith E. Stenger, Hong Xu, Carol Haynes, Elizabet...
VLSISP
2008
132views more  VLSISP 2008»
13 years 8 months ago
Scenario Selection and Prediction for DVS-Aware Scheduling of Multimedia Applications
Modern multimedia applications usually have real-time constraints and they are implemented using application-domain specific embedded processors. Dimensioning a system requires acc...
Stefan Valentin Gheorghita, Twan Basten, Henk Corp...
IMC
2010
ACM
13 years 6 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
CSFW
2011
IEEE
12 years 8 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...