Sciweavers

414 search results - page 70 / 83
» Analyzing and Designing of the Classroom Teaching System Bas...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
CIKM
2009
Springer
14 years 2 months ago
SPIDER: a system for scalable, parallel / distributed evaluation of large-scale RDF data
RDF is a data model for representing labeled directed graphs, and it is used as an important building block of semantic web. Due to its flexibility and applicability, RDF has bee...
Hyunsik Choi, Jihoon Son, YongHyun Cho, Min Kyoung...
BMCBI
2007
113views more  BMCBI 2007»
13 years 7 months ago
CoryneRegNet 4.0 - A reference database for corynebacterial gene regulatory networks
Background: Detailed information on DNA-binding transcription factors (the key players in the regulation of gene expression) and on transcriptional regulatory interactions of micr...
Jan Baumbach
JSAC
2011
253views more  JSAC 2011»
13 years 2 months ago
Control Channel Establishment in Cognitive Radio Networks using Channel Hopping
Abstract—In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., “rendezvous” to establish a link) is a challenging problem....
Kaigui Bian, Jung Min Park, Ruiliang Chen
CCS
2011
ACM
12 years 7 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...