Sciweavers

42 search results - page 9 / 9
» Making Others Believe What They Want
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 9 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
BMCBI
2008
211views more  BMCBI 2008»
13 years 10 months ago
CUDA compatible GPU cards as efficient hardware accelerators for Smith-Waterman sequence alignment
Background: Searching for similarities in protein and DNA databases has become a routine procedure in Molecular Biology. The Smith-Waterman algorithm has been available for more t...
Svetlin Manavski, Giorgio Valle