Sciweavers

762 search results - page 128 / 153
» Characterizing flows in large wireless data networks
Sort
View
BMCBI
2010
146views more  BMCBI 2010»
13 years 8 months ago
On the Choice and Number of Microarrays for Transcriptional Regulatory Network Inference
Background: Transcriptional regulatory network inference (TRNI) from large compendia of DNA microarrays has become a fundamental approach for discovering transcription factor (TF)...
Elissa J. Cosgrove, Timothy S. Gardner, Eric D. Ko...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
RAID
1999
Springer
14 years 4 days ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
ICCS
2007
Springer
14 years 2 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 8 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...