Sciweavers

249 search results - page 26 / 50
» Polymorphic Binding-Time Analysis
Sort
View
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
BMCBI
2006
98views more  BMCBI 2006»
13 years 7 months ago
JLIN: A java based linkage disequilibrium plotter
Background: A great deal of effort and expense are being expended internationally in attempts to detect genetic polymorphisms contributing to susceptibility to complex human disea...
Kim W. Carter, Pamela A. McCaskie, Lyle J. Palmer
ICFP
2009
ACM
14 years 8 months ago
Non-parametric parametricity
Type abstraction and intensional type analysis are features seemingly at odds--type abstraction is intended to guarantee parametricity and representation independence, while type ...
Georg Neis, Derek Dreyer, Andreas Rossberg
BMCBI
2006
140views more  BMCBI 2006»
13 years 7 months ago
SNP-PHAGE - High throughput SNP discovery pipeline
Background: Single nucleotide polymorphisms (SNPs) as defined here are single base sequence changes or short insertion/deletions between or within individuals of a given species. ...
Lakshmi K. Matukumalli, John J. Grefenstette, Davi...
BMCBI
2007
104views more  BMCBI 2007»
13 years 7 months ago
A response to Yu et al. "A forward-backward fragment assembling algorithm for the identification of genomic amplification and de
Background: Yu et al. (BMC Bioinformatics 2007,8: 145+) have recently compared the performance of several methods for the detection of genomic amplification and deletion breakpoin...
Oscar M. Rueda, Ramón Díaz-Uriarte