Sciweavers

412 search results - page 79 / 83
» Bootstrapping Rule Induction
Sort
View
CN
2007
106views more  CN 2007»
13 years 9 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
TSE
2010
148views more  TSE 2010»
13 years 7 months ago
Program Behavior Discovery and Verification: A Graph Grammar Approach
—Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer...
Chunying Zhao, Jun Kong, Kang Zhang
GLOBECOM
2010
IEEE
13 years 7 months ago
Cooperation Stimulation in Cognitive Networks Using Indirect Reciprocity Game Modelling
In cognitive networks, since nodes generally belong to different authorities and pursue different goals, they will not cooperate with others unless cooperation can improve their ow...
Yan Chen, K. J. Ray Liu
BCB
2010
127views Bioinformatics» more  BCB 2010»
13 years 4 months ago
A novel network model for molecular prognosis
Network-based genome-wide association studies (NWAS) utilize the molecular interactions between genes and functional pathways in biomarker identification. This study presents a no...
Ying-Wooi Wan, Swetha Bose, James Denvir, Nancy La...
JSC
2010
100views more  JSC 2010»
13 years 3 months ago
An invariant-based approach to the verification of asynchronous parameterized networks
A uniform verification problem for parameterized systems is to determine whether a temporal property is satisfied for every instance of the system which is composed of an arbitrar...
Igor V. Konnov, Vladimir A. Zakharov