Sciweavers

515 search results - page 93 / 103
» Automated Social Network Analysis for Collaborative Work
Sort
View
BMCBI
2010
126views more  BMCBI 2010»
13 years 7 months ago
GeneBrowser 2: an application to explore and identify common biological traits in a set of genes
Background: The development of high-throughput laboratory techniques created a demand for computer-assisted result analysis tools. Many of these techniques return lists of genes w...
Joel Arrais, João Fernandes, João Pe...
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 7 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
RAID
2010
Springer
13 years 5 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
DSN
2009
IEEE
14 years 2 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea
LICS
1999
IEEE
13 years 11 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson