Filters








371 Hits in 3.0 sec

FindStat - the combinatorial statistics database [article]

Chris Berg and Viviane Pons and Travis Scrimshaw and Jessica Striker and Christian Stump
2014 arXiv   pre-print
The FindStat project at www.FindStat.org provides an online platform for mathematicians, particularly for combinatorialists, to gather information about combinatorial statistics and their relations.  ...  provide a web interface to • test if your data is a known combinatorial statistics in the database, • test if your data can be obtained from known combinatorial statistics in the database by applying combinatorial  ...  maps, or • test if your data has the same distribution as a known combinatorial statistic in the database by applying combinatorial maps.  ... 
arXiv:1401.3690v1 fatcat:a2iee6z4gjbrlm7377kmwpa6pi

XSS-FP: Browser Fingerprinting using HTML Parser Quirks [article]

Erwan Abgrall, Martin Monperrus, Mario Heiderich, Alain Ribault
2012 arXiv   pre-print
Our experiments show that the exact version of a web browser can be determined with 71% of accuracy, and that only 6 tests are sufficient to quickly determine the exact family a web browser belongs to.  ...  There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting.  ...  FINGERPRINTING METHODOLOGY This section presents the methodology we use to fingerprint browsers using their responses when executing XSS vectors based tests.  ... 
arXiv:1211.4812v1 fatcat:vp5a4yqxtzf75nscjohobhvrfu

Covert Channel Construction Method Based on HTTP Composite Protocols

Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li, Xuefeng Shao
2022 Journal of Electrical and Computer Engineering  
The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts  ...  Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong  ...  proportion of other commonly used browsers is roughly the same. erefore, in this paper, only the rst 16 combinations are selected to construct the coding table in sequence, and B1 is set as Google browser  ... 
doi:10.1155/2022/2257524 fatcat:ww2xm56iarcu7kixws5d4efcsa

Research for research: tools for knowledge discovery and visualization

Erik M Van Mulligen, Christiaan Van Der Eijk, Jan A Kors, Bob J A Schijvenaars, Barend Mons
2002 Proceedings. AMIA Symposium  
The browser allows the user to select a seed term and find all related concepts, to find a path between concepts (hypothesis testing), and to retrieve the references to documents or database entries that  ...  This paper describes a method to construct from a set of documents a spatial representation that can be used for information retrieval and knowledge discovery.  ...  The National Library of Medicine is acknowledged for providing us with the Unified Medical Language System. We thank Collexis for allowing us to use their software.  ... 
pmid:12463942 pmcid:PMC2244229 fatcat:ib33k27xhvcz7ptctbzrp3opty

Partial Device Fingerprints [chapter]

Michael Ciere, Carlos Gañán, Michel van Eeten
2017 Lecture Notes in Computer Science  
In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of client-side attributes such as the device's browser and operating system version,  ...  Our approach exploits the natural variation in fingerprints and allows for use of situation-specific knowledge through the specification of a generative probability model.  ...  model, browser version, and browser User-Agent of the client device.  ... 
doi:10.1007/978-3-319-71246-8_14 fatcat:a7efr7n6ajgjreox542p3m23tu

Comprehensive Human Transcription Factor Binding Site Map for Combinatory Binding Motifs Discovery

Arnoldo J. Müller-Molina, Hans R. Schöler, Marcos J. Araúzo-Bravo, Nicholas James Provart
2012 PLoS ONE  
Combinatorial patterns are a useful filter to discover TFBMs that play a major role in orchestrating other factors and thus, are likely to lock/unlock cellular functional clusters.  ...  We tested the predictions against 509 known motifs confirming that our system can reliably predict ab initio motifs with an accuracy of 81%-far higher than previous approaches.  ...  These properties do not require sequence overrepresentation and focus on the fingerprints of specific sequences.  ... 
doi:10.1371/journal.pone.0049086 pmid:23209563 pmcid:PMC3509107 fatcat:g246ikirujcitlgqbirdsjlz3q

Rozzle: De-cloaking Internet Malware

Clemens Kolbitsch, Benjamin Livshits, Benjamin Zorn, Christian Seifert
2012 2012 IEEE Symposium on Security and Privacy  
We observe that, using fingerprinting techniques that capture and exploit unique properties of browser configurations, almost all existing malware can be made virtually impossible for malware scanners  ...  We show that Rozzle incurs virtually no runtime overhead and allows us to replace multiple VMs running different browser configurations with a single Rozzle-enabled browser, reducing the hardware requirements  ...  The combinatorial growth of possible plugin version/browser/browser version combinations dictates the use of only the most popular environment configurations.  ... 
doi:10.1109/sp.2012.48 dblp:conf/sp/KolbitschLZS12 fatcat:w7ciecc6jjfhzhsfjyilyw2jq4

PRISM 3: expanded prediction of natural product chemical structures from microbial genomes

Michael A. Skinnider, Nishanth J. Merwin, Chad W. Johnston, Nathan A. Magarvey
2017 Nucleic Acids Research  
Other major modifications to PRISM include improved sequence input and ORF detection, userfriendliness and output.  ...  Previously, we described PRediction Informatics for Secondary Metabolomes (PRISM), a combinatorial approach to chemical structure prediction for genetically encoded nonribosomal peptides and type I and  ...  PRISM 3 includes a module to render libraries of predicted SMILES for each cluster within the browser using RDKit, increasing the accessibility of chemical structure predictions to users without use of  ... 
doi:10.1093/nar/gkx320 pmid:28460067 pmcid:PMC5570231 fatcat:ybycrr2yyrhvvkr7snudpcbhza

Genomes to natural products PRediction Informatics for Secondary Metabolomes (PRISM)

Michael A. Skinnider, Chris A. Dejong, Philip N. Rees, Chad W. Johnston, Haoxin Li, Andrew L. H. Webster, Morgan A. Wyatt, Nathan A. Magarvey
2015 Nucleic Acids Research  
A library of 57 tailoring reactions is leveraged for combinatorial scaffold library generation when multiple potential substrates are consistent with biosynthetic logic.  ...  Next-generation and metagenomic sequencing indicates untapped genomic potential, yet high rediscovery rates of known metabolites increasingly frustrate conventional natural product screening programs.  ...  Chemical fingerprints, which decompose a chemical graph into a list of salient features, are widely used in assessing chemical similarity (52, 53) . 1024-bit fingerprints for all compounds in each cluster  ... 
doi:10.1093/nar/gkv1012 pmid:26442528 pmcid:PMC4787774 fatcat:eqj6mxghinbtpevow7argaljpq

Combinatorial Transcriptional Control In Blood Stem/Progenitor Cells: Genome-wide Analysis of Ten Major Transcriptional Regulators

Nicola K. Wilson, Samuel D. Foster, Xiaonan Wang, Kathy Knezevic, Judith Schütte, Polynikis Kaimakis, Paulina M. Chilarska, Sarah Kinston, Willem H. Ouwehand, Elaine Dzierzak, John E. Pimanda, Marella F.T.R. de Bruijn (+1 others)
2010 Cell Stem Cell  
Sequencing reads were mapped to the mouse reference genome using MACS , converted to a density plot, and displayed as UCSC genome browser custom tracks.  ...  Matches to consensus sequences were determined as described using TFBSSearch (Chapman et al., 2004) .  ... 
doi:10.1016/j.stem.2010.07.016 pmid:20887958 fatcat:mhclawxaifehtkyv2kibn2zgta

PERF: an exhaustive algorithm for ultra-fast and efficient identification of microsatellites from large DNA sequences

Akshay Kumar Avvaru, Divya Tej Sowpati, Rakesh Kumar Mishra, John Hancock
2017 Bioinformatics  
PERF is several fold faster than existing algorithms and uses up to 5-fold lesser memory.  ...  They have long been used for a variety of purposes in the areas of population genetics, genotyping, marker-assisted selection and forensics.  ...  The existing methods use either a heuristic or a combinatorial approach to find SSRs from a DNA sequence (Lim et al., 2013) .  ... 
doi:10.1093/bioinformatics/btx721 pmid:29121165 fatcat:q27qoir3tve2hnznt7reuemyre

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey [article]

Abdelhakim Hannousse and Salima Yahiouche and Mohamed Cherif Nait-Hamoud
2022 arXiv   pre-print
A comprehensive taxonomy is drawn out describing the different techniques used to prevent, detect, protect and defend against XSS attacks.  ...  Although the diversity of XSS attack types and the scripting languages that can be used to state them, the systematic mapping revealed a remarkable bias toward basic and JavaScript XSS attacks and a dearth  ...  For systematic generation of input tests, several techniques are explored: • Combinatorial security testing: test inputs are designed as a model named input parameter model (IPM).  ... 
arXiv:2205.08425v2 fatcat:mz2upyb3d5ekllmw66t7s4rsom

The Cuidado music browser: an end-to-end electronic music distribution system

François Pachet, Jean-Julien Aucouturier, Amaury La Burthe, Aymeric Zils, Anthony Beurive
2006 Multimedia tools and applications  
music browsers, or for 49 ingredients to be used in browsers (fingerprinting techniques, collaborative filtering 50 systems, metadata repositories, e.g., Wold et al  ...  algorithms like the timbre similarity used in the Music Browser, one 437 needs to be able to: 438 access and manage the collection of music signals the measures should be tested on 439 store each result  ... 
doi:10.1007/s11042-006-0030-6 fatcat:l2xydkum6fbwnbkvumitnt3x7e

Reprogramming of bivalent chromatin states in NRAS mutant melanoma suggests PRC2 inhibition as a therapeutic strategy

Christopher J. Terranova, Ming Tang, Mayinuer Maitituoheti, Ayush T. Raman, Archit K. Ghosh, Jonathan Schulz, Samir B. Amin, Elias Orouji, Katarzyna Tomczak, Sharmistha Sarkar, Junna Oba, Caitlin Creasy (+14 others)
2021 Cell Reports  
Resolution of bivalency using pharmacological inhibition of EZH2 decreases invasive capacity of melanoma cells and markedly reduces tumor burden in vivo, specifically in NRAS mutants.  ...  Combinatorial chromatin state profiling of 46 melanoma samples reveals an association of NRAS mutants with bivalent histone H3 lysine 27 trimethylation (H3K27me3) and Polycomb repressive complex 2.  ...  Short tandem repeat (STR) DNA fingerprinting was done by the UTMDACC CCSG-funded Characterized Cell Line Core, NCI CA016672.  ... 
doi:10.1016/j.celrep.2021.109410 pmid:34289358 pmcid:PMC8369408 fatcat:tfn32wzvlzbmrkonlcegnuakzi

CpG_MPs: identification of CpG methylation patterns of genomic regions from high-throughput bisulfite sequencing data

Jianzhong Su, Haidan Yan, Yanjun Wei, Hongbo Liu, Hui Liu, Fang Wang, Jie Lv, Qiong Wu, Yan Zhang
2012 Nucleic Acids Research  
High-throughput bisulfite sequencing is widely used to measure cytosine methylation at single-base resolution in eukaryotes.  ...  Furthermore, the conservatively and differentially methylated regions across paired or multiple samples (cells or tissues) are identified by combining a combinatorial algorithm with Shannon entropy.  ...  MATERIALS AND METHODS Database The human reference sequences and Refseq gene annotation were downloaded from the UCSC Genome Browser (53) .  ... 
doi:10.1093/nar/gks829 pmid:22941633 pmcid:PMC3592415 fatcat:ty5xzeuzqjadlo7utjclkskyhi
« Previous Showing results 1 — 15 out of 371 results