Sciweavers

631 search results - page 61 / 127
» An experimental evaluation of continuous testing during deve...
Sort
View
CSREASAM
2006
13 years 9 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
ERCIMDL
1999
Springer
138views Education» more  ERCIMDL 1999»
14 years 4 days ago
Disambiguation Strategies for Cross-Language Information Retrieval
Abstract. This paper gives an overview of tools and methods for CrossLanguage Information Retrieval (CLIR) that are developed within the Twenty-One project. The tools and methods a...
Djoerd Hiemstra, Franciska de Jong
BMCBI
2006
195views more  BMCBI 2006»
13 years 8 months ago
CAFTAN: a tool for fast mapping, and quality assessment of cDNAs
Background: The German cDNA Consortium has been cloning full length cDNAs and continued with their exploitation in protein localization experiments and cellular assays. However, t...
Coral del Val, Vladimir Yurjevich Kuryshev, Karl-H...
SIGCOMM
2009
ACM
14 years 2 months ago
Energy-aware performance optimization for next-generation green network equipment
Besides a more widespread sensitivity to ecological issues, the interest in energy-efficient network technologies springs from heavy and critical economical needs, since both ener...
Raffaele Bolla, Roberto Bruschi, Franco Davoli, An...