Sciweavers

1278 search results - page 216 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
SOCIALCOM
2010
13 years 7 months ago
Opinion Summarization in Bengali: A Theme Network Model
Theme network is a semantic network of document specific themes. So far Natural Language Processing (NLP) research patronized much of topic based summarizer system, unable to captu...
Amitava Das, Sivaji Bandyopadhyay
KDD
2008
ACM
165views Data Mining» more  KDD 2008»
14 years 9 months ago
Colibri: fast mining of large static and dynamic graphs
Low-rank approximations of the adjacency matrix of a graph are essential in finding patterns (such as communities) and detecting anomalies. Additionally, it is desirable to track ...
Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, P...
BMCBI
2010
86views more  BMCBI 2010»
13 years 9 months ago
Reaction graph kernels predict EC numbers of unknown enzymatic reactions in plant secondary metabolism
Background: Understanding of secondary metabolic pathway in plant is essential for finding druggable candidate enzymes. However, there are many enzymes whose functions are not yet...
Hiroto Saigo, Masahiro Hattori, Hisashi Kashima, K...
INFOCOM
2009
IEEE
14 years 3 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
ACC
2011
65views more  ACC 2011»
12 years 9 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis