Sciweavers

1356 search results - page 53 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
CCS
2009
ACM
14 years 3 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
AAAI
2007
13 years 10 months ago
Learning Large Scale Common Sense Models of Everyday Life
Recent work has shown promise in using large, publicly available, hand-contributed commonsense databases as joint models that can be used to infer human state from day-to-day sens...
William Pentney, Matthai Philipose, Jeff A. Bilmes...
BMCBI
2008
182views more  BMCBI 2008»
13 years 8 months ago
MiMiR - an integrated platform for microarray data sharing, mining and analysis
Background: Despite considerable efforts within the microarray community for standardising data format, content and description, microarray technologies present major challenges i...
Chris Tomlinson, Manjula Thimma, Stelios Alexandra...
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
TOG
2008
102views more  TOG 2008»
13 years 8 months ago
Real-time data driven deformation using kernel canonical correlation analysis
Achieving intuitive control of animated surface deformation while observing a specific style is an important but challenging task in computer graphics. Solutions to this task can ...
Wei-Wen Feng, Byung-Uck Kim, Yizhou Yu