Sciweavers

588 search results - page 86 / 118
» Activity rhythm detection and modeling
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
INFOCOM
2002
IEEE
14 years 3 months ago
TCP Network Calculus: The case of large delay-bandwidth product
Abstract— We present in this paper an analytical model for the calculation of network load and drop probabilities in a TCP/IP network with general topology. First we formulate ou...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
BMCBI
2010
113views more  BMCBI 2010»
13 years 10 months ago
Statistical method on nonrandom clustering with application to somatic mutations in cancer
Background: Human cancer is caused by the accumulation of tumor-specific mutations in oncogenes and tumor suppressors that confer a selective growth advantage to cells. As a conse...
Jingjing Ye, Adam Pavlícek, Elizabeth A. Lu...
ACSAC
2008
IEEE
14 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CVBIA
2005
Springer
14 years 3 months ago
Automatic Extraction of Femur Contours from Hip X-Ray Images
Abstract. Extraction of bone contours from x-ray images is an important first step in computer analysis of medical images. It is more complex than the segmentation of CT and MR im...
Ying Chen, Xianhe Ee, Wee Kheng Leow, Tet Sen Howe