Sciweavers

16 search results - page 3 / 4
» Masquerade Detection Using Truncated Command Lines
Sort
View
JDCTA
2010
171views more  JDCTA 2010»
13 years 2 months ago
Computer Interaction System using Hand Posture Identification
Natural and friendly interface is critical for the development of service robots. Gesture-based interface offers a way to enable untrained users to interact with robots more easil...
Sushma D. Ghode, S. A. Chhabria, R. V. Dharaskar
ACSAC
2005
IEEE
14 years 1 months ago
Evolving Successful Stack Overflow Attacks for Vulnerability Testing
The work presented in this paper is intended to test crucial system services against stack overflow vulnerabilities. The focus of the test is the user-accessible variables, that i...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
BMCBI
2011
13 years 2 months ago
OrthoInspector: comprehensive orthology analysis and visual exploration
Background: The accurate determination of orthology and inparalogy relationships is essential for comparative sequence analysis, functional gene annotation and evolutionary studie...
Benjamin Linard, Julie D. Thompson, Olivier Poch, ...
BMCBI
2007
179views more  BMCBI 2007»
13 years 7 months ago
rMotifGen: random motif generator for DNA and protein sequences
Background: Detection of short, subtle conserved motif regions within a set of related DNA or amino acid sequences can lead to discoveries about important regulatory domains such ...
Eric C. Rouchka, C. Timothy Hardin
CEC
2007
IEEE
14 years 1 months ago
Fingerprint analysis of the noisy prisoner's dilemma
Abstract— Fingerprinting is a technique that permits automatic classification of strategies for playing a game. In this study the evolution of strategies for playing the iterate...
Daniel A. Ashlock, Eun-Youn Kim, Wendy Ashlock