Sciweavers

704 search results - page 52 / 141
» Application of kernels to link analysis
Sort
View
169
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
AAAI
2008
15 years 7 months ago
In-the-Dark Network Traffic Classification Using Support Vector Machines
This work addresses the problem of in-the-dark traffic classification for TCP sessions, an important problem in network management. An innovative use of support vector machines (S...
William H. Turkett Jr., Andrew V. Karode, Errin W....
144
Voted
BMCBI
2010
108views more  BMCBI 2010»
15 years 2 months ago
BIGSdb: Scalable analysis of bacterial genome variation at the population level
Background: The opportunities for bacterial population genomics that are being realised by the application of parallel nucleotide sequencing require novel bioinformatics platforms...
Keith A. Jolley, Martin C. J. Maiden
130
Voted
APN
1993
Springer
15 years 9 months ago
Transient Analysis of Deterministic and Stochastic Petri Nets
This paper introduces an efficient numerical algorithm for transient analysis of deterministic and stochastic Petri nets (DSPNs) and other discrete-event stochastic systems with ...
Hoon Choi, Vidyadhar G. Kulkarni, Kishor S. Trived...
166
Voted
PR
2008
129views more  PR 2008»
15 years 4 months ago
A comparison of generalized linear discriminant analysis algorithms
7 Linear discriminant analysis (LDA) is a dimension reduction method which finds an optimal linear transformation that maximizes the class separability. However, in undersampled p...
Cheong Hee Park, Haesun Park