Sciweavers

1057 search results - page 190 / 212
» Testing from Formal Specifications, a Generic Approach
Sort
View
LISA
2000
13 years 9 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
CLEF
2006
Springer
13 years 11 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
BMCBI
2006
87views more  BMCBI 2006»
13 years 7 months ago
Phylogeny based discovery of regulatory elements
Background: Algorithms that locate evolutionarily conserved sequences have become powerful tools for finding functional DNA elements, including transcription factor binding sites;...
Jason Gertz, Justin C. Fay, Barak A. Cohen
TROB
2008
107views more  TROB 2008»
13 years 7 months ago
Templates and Anchors for Antenna-Based Wall Following in Cockroaches and Robots
The interplay between robotics and neuromechanics facilitates discoveries in both fields: nature provides roboticists with design ideas, while robotics research elucidates critical...
J. Lee, S. N. Sponberg, Owen Y. Loh, Andrew G. Lam...
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...