Sciweavers

1781 search results - page 301 / 357
» Visualizing program execution using user abstractions
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
BMCBI
2007
185views more  BMCBI 2007»
13 years 9 months ago
GEDI: a user-friendly toolbox for analysis of large-scale gene expression data
Background: Several mathematical and statistical methods have been proposed in the last few years to analyze microarray data. Most of those methods involve complicated formulas, a...
André Fujita, João Ricardo Sato, Car...
BMCBI
2006
120views more  BMCBI 2006»
13 years 8 months ago
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Background: In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. ...
Arnim Jenett, Johannes E. Schindelin, Martin Heise...
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
COMPSAC
2008
IEEE
14 years 3 months ago
A Component-Based Model and Language for Wireless Sensor Network Applications
Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...