Results 61 to 70 of about 58,956 (207)
Remote Control Trojan Vulnerability Mining Based on Reverse Analysis of Network Protocol [PDF]
In view of Trojan’s control of the popular Advanced Persistent Threat(APT) attack’s method,this paper presents an active defense idea,namely for fuzzing and paralysis attack of closed source code Trojan.It uses generalized suffix tree and hierarchical ...
PAN Daoxin,WANG Yijun,XUE Zhi
doaj +1 more source
Subpath Queries on Compressed Graphs: A Survey
Text indexing is a classical algorithmic problem that has been studied for over four decades: given a text T, pre-process it off-line so that, later, we can quickly count and locate the occurrences of any string (the query pattern) in T in time ...
Nicola Prezza
doaj +1 more source
Optimal Prefix and Suffix Queries on Texts [PDF]
International audienceIn this paper, we study a restricted version of the position restricted pattern matching problem introduced and studied by Makinen and Navarro [V. Makinen, G. Navarro, Position-restricted substring searching, in: J.R.
Crochemore, Maxime +2 more
core +4 more sources
Arboreta bridge people and nature while conserving tree biodiversity, supporting climate resilience, and advancing environmental education. This study maps over a century of available and indexed arboretum research, uncovering trends, knowledge gaps, and opportunities for collaboration.
Catarina Patoilo Teixeira +1 more
wiley +1 more source
Multiple sequence alignment based on set covers
We introduce a new heuristic for the multiple alignment of a set of sequences. The heuristic is based on a set cover of the residue alphabet of the sequences, and also on the determination of a significant set of blocks comprising subsequences of the ...
A. Bahr +15 more
core +2 more sources
This review critically compares the electrochemical performance of carbon‐based and alloy‐type anodes for sodium‐ion batteries, with an emphasis on strategies that enhance practical deployment. It highlights how synergistic optimization of microstructure, electrolyte, and presodiation improves hard carbon, while nanostructuring and interfacial ...
Anele Tshaka +3 more
wiley +1 more source
A representation of a compressed de Bruijn graph for pan-genome analysis that enables search [PDF]
Recently, Marcus et al. (Bioinformatics 2014) proposed to use a compressed de Bruijn graph to describe the relationship between the genomes of many individuals/strains of the same or closely related species.
Beller, Timo, Ohlebusch, Enno
core +2 more sources
Flexural performance of concrete‐filled steel tubular beams with wood chip aggregate
Abstract This study investigates the flexural performance of concrete‐filled steel tubular (CFST) beams with partial replacement of aggregates by wood chips (0%–25%) through experimental and numerical analysis. This study is novel in that it experimentally and numerically investigates the flexural behavior of CFST beams with partial replacement of ...
Mizan Ahmed +6 more
wiley +1 more source
This article introduces the concept of excluded participation to examine how inclusion and exclusion are negotiated in real time within a Danish fifth‐grade classroom. Using a micro‐sociological framework, particularly the work of Erving Goffman, the study focuses on the case of Anders, a student whose participation is symbolically recognized yet ...
Jørn Bjerre
wiley +1 more source
Data structures of genome and protein sequences indexing
Data structure is a tool for storage and retrieval of information which is named logic and mathematic way of specific data organization. various sequences of genes and proteins in various creatures increases the amount of data in genome databases, and ...
Adeleh asadi
doaj

