Sciweavers

249 search results - page 42 / 50
» Security of open source web applications
Sort
View
136
Voted
ACSAC
2010
IEEE
15 years 25 days ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
127
Voted
BMCBI
2010
98views more  BMCBI 2010»
15 years 3 months ago
miRMaid: a unified programming interface for microRNA data resources
Background: MicroRNAs (miRNAs) are endogenous small RNAs that play a key role in post-transcriptional regulation of gene expression in animals and plants. The number of known miRN...
Anders Jacobsen, Anders Krogh, Sakari Kauppinen, M...
118
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
BMCBI
2005
130views more  BMCBI 2005»
15 years 3 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
ICC
2011
IEEE
269views Communications» more  ICC 2011»
14 years 3 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino