Sciweavers

ICST
2011
IEEE
13 years 4 months ago
EFindBugs: Effective Error Ranking for FindBugs
—Static analysis tools have been widely used to detect potential defects without executing programs. It helps programmers raise the awareness about subtle correctness issues in t...
Haihao Shen, Jianhong Fang, Jianjun Zhao
ICASSP
2011
IEEE
13 years 4 months ago
Combining generic and class-specific codebooks for object categorization and detection
Combining advantages of shape and appearance features, we propose a novel model that integrates these two complementary features into a common framework for object categorization ...
Hong Pan, Yaping Zhu, Liang-Zheng Xia, Truong Q. N...
IJSSE
2010
121views more  IJSSE 2010»
13 years 9 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
GLOBECOM
2010
IEEE
13 years 10 months ago
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
BMCBI
2005
140views more  BMCBI 2005»
14 years 10 days ago
Dissecting systems-wide data using mixture models: application to identify affected cellular processes
Background: Functional analysis of data from genome-scale experiments, such as microarrays, requires an extensive selection of differentially expressed genes. Under many condition...
J. Peter Svensson, Renée X. de Menezes, Ing...
IDA
2007
Springer
14 years 11 days ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder
CORR
2006
Springer
77views Education» more  CORR 2006»
14 years 14 days ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
CORR
2006
Springer
152views Education» more  CORR 2006»
14 years 14 days ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle
BMCBI
2006
74views more  BMCBI 2006»
14 years 14 days ago
Effects of filtering by Present call on analysis of microarray experiments
Background: Affymetrix GeneChips
Jeanette N. McClintick, Howard J. Edenberg
BMCBI
2008
133views more  BMCBI 2008»
14 years 16 days ago
CORE_TF: a user-friendly interface to identify evolutionary conserved transcription factor binding sites in sets of co-regulated
Background: The identification of transcription factor binding sites is difficult since they are only a small number of nucleotides in size, resulting in large numbers of false po...
Matthew S. Hestand, Michiel van Galen, Michel P. V...