Sciweavers

419 search results - page 20 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ITNG
2010
IEEE
14 years 1 months ago
BAUT: A Bayesian Driven Tutoring System
—This paper presents the design of BAUT, a tutoring system that explores statistical approach for providing instant project failure analysis. Driven by a Bayesian Network (BN) in...
Song Tan, Kai Qian, Xiang Fu, Prabir Bhattacharya
WCRE
2005
IEEE
14 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
13 years 6 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
ISBI
2008
IEEE
14 years 9 months ago
Automated comparison of protein subcellular location patterns between images of normal and cancerous tissues
Early cancer diagnosis and evaluation of cancer progression during treatment are two important factors for clinical therapy. In this study we propose a novel approach which automa...
Estelle Glory, Justin Newberg, Robert F. Murphy
ESWA
2006
161views more  ESWA 2006»
13 years 8 months ago
Automated trend analysis of proteomics data using an intelligent data mining architecture
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalle...
James Malone, Kenneth McGarry, Chris Bowerman