Sciweavers

635 search results - page 65 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
DSN
2006
IEEE
14 years 18 days ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 11 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
BMCBI
2010
138views more  BMCBI 2010»
13 years 9 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
CCGRID
2004
IEEE
14 years 20 days ago
Skeleton based performance prediction on shared networks
The performance skeleton of an application is a short running program whose performance in any scenario reflects the performance of the application it represents. Such a skeleton ...
Sukhdeep Sodhi, Jaspal Subhlok
SIGMOD
2006
ACM
114views Database» more  SIGMOD 2006»
14 years 9 months ago
Ordering the attributes of query results
There has been a great deal of interest in the past few years on ranking of results of queries on structured databases, including work on probabilistic information retrieval, rank...
Gautam Das, Vagelis Hristidis, Nishant Kapoor, S. ...