Sciweavers

712 search results - page 121 / 143
» New Techniques for Generation and Analysis of Evolutionary T...
Sort
View
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
BMCBI
2011
13 years 2 months ago
ATAQS: A computational software tool for high throughput transition optimization and validation for selected reaction monitoring
Background: Since its inception, proteomics has essentially operated in a discovery mode with the goal of identifying and quantifying the maximal number of proteins in a sample. I...
Mi-Youn K. Brusniak, Sung-Tat Kwok, Mark Christian...
ICSM
1999
IEEE
13 years 12 months ago
A Two-Phase Process for Software Architecture Improvement
Software architecture is important for large systems in which it is the main means for, among other things, controlling complexity. Current ideas on software architectures were no...
René L. Krikhaar, André Postma, M. P...
AROBOTS
2005
115views more  AROBOTS 2005»
13 years 7 months ago
Obstacle Detection and Terrain Classification for Autonomous Off-Road Navigation
Autonomous navigation in cross-country environments presents many new challenges with respect to more traditional, urban environments. The lack of highly structured components in t...
Roberto Manduchi, Andres Castano, A. Talukder, Lar...
BMCBI
2006
108views more  BMCBI 2006»
13 years 7 months ago
RibAlign: a software tool and database for eubacterial phylogeny based on concatenated ribosomal protein subunits
Background: Until today, analysis of 16S ribosomal RNA (rRNA) sequences has been the de-facto gold standard for the assessment of phylogenetic relationships among prokaryotes. How...
Hanno Teeling, Frank Oliver Glöckner