Sciweavers

1356 search results - page 126 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SC
2000
ACM
14 years 18 days ago
From Trace Generation to Visualization: A Performance Framework for Distributed Parallel Systems
In this paper we describe a trace analysis framework, from trace generation to visualization. It includes a unified tracing facility on IBM® SP™ systems, a self-defining interv...
Ching-Farn Eric Wu, Anthony Bolmarcich, Marc Snir,...
WWW
2002
ACM
14 years 9 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
14 years 2 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
BMCBI
2008
97views more  BMCBI 2008»
13 years 8 months ago
MCM-test: a fuzzy-set-theory-based approach to differential analysis of gene pathways
Background: Gene pathway can be defined as a group of genes that interact with each other to perform some biological processes. Along with the efforts to identify the individual g...
Lily R. Liang, Vinay Mandal, Yi Lu, Deepak Kumar
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 13 days ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares