Sciweavers

787 search results - page 107 / 158
» Source code analysis and manipulation
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
BICOB
2010
Springer
14 years 2 months ago
A Grid-Enabled Problem Solving Environment for QTL Analysis in R
We present a grid-enabled problem solving environment (PSE), for multidimensional QTL analysis. The concept of a computational grid has not been fully realized within this and oth...
Mahen Jayawardena, Carl Nettelblad, Salman Zubair ...
BMCBI
2010
167views more  BMCBI 2010»
13 years 10 months ago
BisoGenet: a new tool for gene network building, visualization and analysis
Background: The increasing availability and diversity of omics data in the post-genomic era offers new perspectives in most areas of biomedical research. Graph-based biological ne...
Alexander Martin, Maria Elena Ochagavia, Laya C. R...
DIMVA
2006
13 years 11 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
BMCBI
2005
120views more  BMCBI 2005»
13 years 9 months ago
SpectralNET - an application for spectral graph analysis and visualization
Background: Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks ...
Joshua J. Forman, Paul A. Clemons, Stuart L. Schre...