Sciweavers

1356 search results - page 102 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ICDM
2006
IEEE
102views Data Mining» more  ICDM 2006»
14 years 2 months ago
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
Interpersonal interaction plays an important role in organizational dynamics, and understanding these interaction networks is a key issue for any organization, since these can be ...
Nishith Pathak, Sandeep Mane, Jaideep Srivastava
INFOCOM
2010
IEEE
13 years 6 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
NSPW
2003
ACM
14 years 1 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
BMCBI
2007
141views more  BMCBI 2007»
13 years 8 months ago
Reconstruction of human protein interolog network using evolutionary conserved network
Background: The recent increase in the use of high-throughput two-hybrid analysis has generated large quantities of data on protein interactions. Specifically, the availability of...
Tao-Wei Huang, Chung-Yen Lin, Cheng-Yan Kao
BMCBI
2008
129views more  BMCBI 2008»
13 years 8 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...