Sciweavers

787 search results - page 154 / 158
» Source code analysis and manipulation
Sort
View
CCS
2005
ACM
14 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
14 years 1 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
BIOINFORMATICS
2008
97views more  BIOINFORMATICS 2008»
13 years 10 months ago
An integrated system for studying residue coevolution in proteins
Residue coevolution has recently emerged as an important concept, especially in the context of protein structures. While a multitude of different functions for quantifying it have...
Kevin Y. Yip, Prianka Patel, Philip M. Kim, Donald...
BIOINFORMATICS
2007
195views more  BIOINFORMATICS 2007»
13 years 10 months ago
Context-dependent clustering for dynamic cellular state modeling of microarray gene expression
Motivation: High-throughput expression profiling allows researchers to study gene activities globally. Genes with similar expression profiles are likely to encode proteins that ma...
Shinsheng Yuan, Ker-Chau Li
BMCBI
2010
156views more  BMCBI 2010»
13 years 10 months ago
PeakAnalyzer: Genome-wide annotation of chromatin binding and modification loci
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...