Sciweavers

1554 search results - page 106 / 311
» Testing Polymorphic Behavior
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ISMB
2000
13 years 9 months ago
Pattern Recognition of Genomic Features with Microarrays: Site Typing of Mycobacterium Tuberculosis Strains
Mycobacterium tuberculosis (M. tb.) strains differ in the number and locations of a transposon-like insertion sequence known as IS6110. Accurate detection of this sequence can be ...
Soumya Raychaudhuri, Joshua M. Stuart, Xuemin Liu,...
BMCBI
2005
163views more  BMCBI 2005»
13 years 8 months ago
CoaSim: A flexible environment for simulating genetic data under coalescent models
Background: Coalescent simulations are playing a large role in interpreting large scale intraspecific sequence or polymorphism surveys and for planning and evaluating association ...
Thomas Mailund, Mikkel H. Schierup, Christian N. S...
DTJ
1998
171views more  DTJ 1998»
13 years 7 months ago
Measurement and Analysis of C and C++ Performance
ir increasing use of abstraction, modularity, delayed binding, polymorphism, and source reuse, especially when these attributes are used in combination. Modern processor architectu...
Hemant G. Rotithor, Kevin W. Harris, Mark W. Davis
BMCBI
2011
13 years 2 months ago
SNP-based pathway enrichment analysis for genome-wide association studies
Background: Recently we have witnessed a surge of interest in using genome-wide association studies (GWAS) to discover the genetic basis of complex diseases. Many genetic variatio...
Lingjie Weng, Fabio Macciardi, Aravind Subramanian...