Sciweavers

1356 search results - page 105 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
VISUALIZATION
2003
IEEE
14 years 1 months ago
A Visual Exploration Process for the Analysis of Internet Routing Data
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information disse...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
14 years 8 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
CASES
2003
ACM
14 years 1 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
SIGCOMM
2009
ACM
14 years 2 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
PRIB
2009
Springer
135views Bioinformatics» more  PRIB 2009»
14 years 2 months ago
Sequential Hierarchical Pattern Clustering
Abstract. Clustering is a widely used unsupervised data analysis technique in machine learning. However, a common requirement amongst many existing clustering methods is that all p...
Bassam Farran, Amirthalingam Ramanan, Mahesan Nira...