Sciweavers

985 search results - page 70 / 197
» On the validity of digital signatures
Sort
View
CONEXT
2007
ACM
13 years 10 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
PPDP
2005
Springer
14 years 2 months ago
Formal validation of pattern matching code
When addressing the formal validation of generated software, two main alternatives consist either to prove the correctness of compilers or to directly validate the generated code....
Claude Kirchner, Pierre-Etienne Moreau, Antoine Re...
BMCBI
2008
155views more  BMCBI 2008»
13 years 9 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
BMCBI
2008
155views more  BMCBI 2008»
13 years 9 months ago
Extending pathways based on gene lists using InterPro domain signatures
Background: High-throughput technologies like functional screens and gene expression analysis produce extended lists of candidate genes. Gene-Set Enrichment Analysis is a commonly...
Florian Hahne, Alexander Mehrle, Dorit Arlt, Annem...
MICCAI
2002
Springer
14 years 9 months ago
Validation of Image Segmentation and Expert Quality with an Expectation-Maximization Algorithm
Characterizing the performance of image segmentation approaches has been a persistent challenge. Performance analysis is important since segmentation algorithms often have limited ...
Simon K. Warfield, Kelly H. Zou, William M. Wells ...