Sciweavers

411 search results - page 15 / 83
» Technological Strategy of Using Global Positioning System: A...
Sort
View
ICONIP
2009
13 years 6 months ago
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning
Malware (Malicious Software) of Windows OS has become more sophisticated. To take some countermeasures for recent infection, more intelligent and automated system log analysis is n...
Ruo Ando
DBSEC
2010
161views Database» more  DBSEC 2010»
13 years 10 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
GECCO
2004
Springer
115views Optimization» more  GECCO 2004»
14 years 2 months ago
An Evolutionary Approach with Pharmacophore-Based Scoring Functions for Virtual Database Screening
We have developed a new tool for virtual database screening. This tool, referred to as the Generic Evolutionary Method for molecular DOCKing (GEMDOCK), combines an evolutionary app...
Jinn-Moon Yang, Tsai-Wei Shen, Yen-Fu Chen, Yi-Yua...
BMCBI
2004
169views more  BMCBI 2004»
13 years 8 months ago
A power law global error model for the identification of differentially expressed genes in microarray data
Background: High-density oligonucleotide microarray technology enables the discovery of genes that are transcriptionally modulated in different biological samples due to physiolog...
Norman Pavelka, Mattia Pelizzola, Caterina Vizzard...
SIGSOFT
2010
ACM
13 years 6 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan