Sciweavers

1356 search results - page 173 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
IHI
2012
370views Healthcare» more  IHI 2012»
12 years 3 months ago
FUSE: a system for data-driven multi-level functional summarization of protein interaction networks
Despite recent progress in high-throughput experimental studies, systems level visualization and analysis of large protein interaction networks (ppi) remains a challenging task, g...
Boon-Siew Seah, Sourav S. Bhowmick, Charles Forbes...
BMCBI
2010
154views more  BMCBI 2010»
13 years 8 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
12 years 11 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
IMC
2005
ACM
14 years 1 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...