[PDF][PDF] Automated Worm Fingerprinting.
Network worms are a clear and growing threat to the security of today’s Internet-connected
hosts and networks. The combination of the Internet’s unrestricted connectivity and …
hosts and networks. The combination of the Internet’s unrestricted connectivity and …
Packet classification using multidimensional cutting
This paper introduces a classification algorithm called phHyperCuts. Like the previously best
known algorithm, HiCuts, HyperCuts is based on a decision tree structure. Unlike HiCuts, …
known algorithm, HiCuts, HyperCuts is based on a decision tree structure. Unlike HiCuts, …
The regenerative capacity of zebrafish reverses cardiac failure caused by genetic cardiomyocyte depletion
…, M Gemberling, JS Burris, SP Singh… - …, 2011 - journals.biologists.com
Natural models of heart regeneration in lower vertebrates such as zebrafish are based on
invasive surgeries causing mechanical injuries that are limited in size. Here, we created a …
invasive surgeries causing mechanical injuries that are limited in size. Here, we created a …
Packet classification for core routers: Is there an alternative to CAMs?
F Baboescu, S Singh… - IEEE INFOCOM 2003 …, 2003 - ieeexplore.ieee.org
A classifier consists of a set of rules for classifying packets based on header fields. Because
core routers can have fairly large (eg, 2000 rule) database and must use limited SRAM to …
core routers can have fairly large (eg, 2000 rule) database and must use limited SRAM to …
Efficacy and safety of insulin analogues for the management of diabetes mellitus: a meta-analysis
SR Singh, F Ahmad, A Lal, C Yu, Z Bai, H Bennett - Cmaj, 2009 - Can Med Assoc
Background: Although insulin analogues are commonly prescribed for the management of
diabetes mellitus, there is uncertainty regarding their optimal use. We conducted meta-…
diabetes mellitus, there is uncertainty regarding their optimal use. We conducted meta-…
Network monitoring using traffic dispersion graphs (tdgs)
Monitoring network traffic and detecting unwanted applications has become a challenging
problem, since many applications obfuscate their traffic using unregistered port numbers or …
problem, since many applications obfuscate their traffic using unregistered port numbers or …
Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications
In traffic monitoring, accounting, and network anomaly detection, it is often important to be
able to detect high-volume traffic clusters in near real-time. Such heavy-hitter traffic clusters …
able to detect high-volume traffic clusters in near real-time. Such heavy-hitter traffic clusters …
[PDF][PDF] Regeneration of amputated zebrafish fin rays from de novo osteoblasts
Determining the cellular source of new skeletal elements is critical for understanding
appendage regeneration in amphibians and fish. Recent lineage-tracing studies indicated that …
appendage regeneration in amphibians and fish. Recent lineage-tracing studies indicated that …
Robots that ask for help: Uncertainty alignment for large language model planners
Large language models (LLMs) exhibit a wide range of promising capabilities -- from step-by-step
planning to commonsense reasoning -- that may provide utility for robots, but remain …
planning to commonsense reasoning -- that may provide utility for robots, but remain …
[HTML][HTML] The 20S as a stand-alone proteasome in cells can degrade the ubiquitin tag
…, A Rozenberg, R Morag, MP Sahoo, SK Singh… - Nature …, 2021 - nature.com
The proteasome, the primary protease for ubiquitin-dependent proteolysis in eukaryotes, is
usually found as a mixture of 30S, 26S, and 20S complexes. These complexes have common …
usually found as a mixture of 30S, 26S, and 20S complexes. These complexes have common …