Sciweavers

2236 search results - page 377 / 448
» Intrusion detection techniques and approaches
Sort
View
CIKM
2007
Springer
14 years 3 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
SIGSOFT
2006
ACM
14 years 3 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
BMCBI
2010
155views more  BMCBI 2010»
13 years 9 months ago
BISMA - Fast and accurate bisulfite sequencing data analysis of individual clones from unique and repetitive sequences
Background: Bisulfite sequencing is a popular method to analyze DNA methylation patterns at high resolution. A region of interest is targeted by PCR and about 20-50 subcloned DNA ...
Christian Rohde, Yingying Zhang, Richard Reinhardt...
BMCBI
2007
145views more  BMCBI 2007»
13 years 9 months ago
Colony size measurement of the yeast gene deletion strains for functional genomics
Background: Numerous functional genomics approaches have been developed to study the model organism yeast, Saccharomyces cerevisiae, with the aim of systematically understanding t...
Negar Memarian, Matthew Jessulat, Javad Alirezaie,...
TASE
2008
IEEE
13 years 8 months ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du