Sciweavers

426 search results - page 65 / 86
» Procedures and tools for analysis of network traffic measure...
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 7 months ago
Analysis of Social Voting Patterns on Digg
The social Web is transforming the way information is created and distributed. Authoring tools, e.g., blog publishing services, enable users to quickly and easily publish content,...
Kristina Lerman, Aram Galstyan
BMCBI
2010
96views more  BMCBI 2010»
13 years 7 months ago
OpenChrom: a cross-platform open source software for the mass spectrometric analysis of chromatographic data
Background: Today, data evaluation has become a bottleneck in chromatographic science. Analytical instruments equipped with automated samplers yield large amounts of measurement d...
Philip Wenig, Juergen Odermatt
ALMOB
2006
113views more  ALMOB 2006»
13 years 7 months ago
Inverse bifurcation analysis: application to simple gene systems
Background: Bifurcation analysis has proven to be a powerful method for understanding the qualitative behavior of gene regulatory networks. In addition to the more traditional for...
James Lu, Heinz W. Engl, Peter Schuster
CJ
2010
105views more  CJ 2010»
13 years 4 months ago
Efficient Semantic Information Exchange for Ambient Intelligence
This paper studies semantic efficiency measures for ambient intelligence. We follow an agent-based approach and investigate how large quantities of information can be efficiently ...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....