Sciweavers

197 search results - page 31 / 40
» Is attack better than defense
Sort
View
BMCBI
2008
125views more  BMCBI 2008»
13 years 7 months ago
Tandem duplication, circular permutation, molecular adaptation: how Solanaceae resist pests via inhibitors
Background: The Potato type II (Pot II) family of proteinase inhibitors plays critical roles in the defense system of plants from Solanaceae family against pests. To better unders...
Lesheng Kong, Shoba Ranganathan
IJBRA
2010
121views more  IJBRA 2010»
13 years 6 months ago
Mining Cytochrome b561 proteins from plant genomes
—Cytochrome b561 (Cyt-b561) proteins play important functions in plants such as anti-toxin defense reactions, growth and development, and prevention of damage to plants from exce...
Stephen O. Opiyo, Etsuko N. Moriyama
CCS
2007
ACM
14 years 1 months ago
Implementing and testing dynamic timeout adjustment as a dos counter-measure
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queues as potential counter-measures against degradation of service attacks. Previo...
Daniel Boteanu, Edouard Reich, José M. Fern...
CCS
2009
ACM
14 years 2 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
CCS
2006
ACM
13 years 11 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo