Sciweavers

1356 search results - page 99 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
WS
2006
ACM
14 years 2 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
CIKM
2008
Springer
13 years 10 months ago
Viability of in-house datamarting approaches for population genetics analysis of snp genotypes
Background: Databases containing very large amounts of SNP (Single Nucleotide Polymorphism) data are now freely available for researchers interested in medical and/or population g...
Jorge Amigo, Christopher Phillips, Antonio Salas
LAWEB
2006
IEEE
14 years 2 months ago
Analysis of Web Search Engine Clicked Documents
In this paper we process and analyze web search engine query and click data from the perspective of the documents (URL’s) selected. We initially define possible document categor...
David F. Nettleton, Liliana Calderón-Benavi...
BMCBI
2007
156views more  BMCBI 2007»
13 years 8 months ago
Large-scale clustering of CAGE tag expression data
Background: Recent analyses have suggested that many genes possess multiple transcription start sites (TSSs) that are differentially utilized in different tissues and cell lines. ...
Kazuro Shimokawa, Yuko Okamura-Oho, Takio Kurita, ...
IEEESP
2011
12 years 11 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...