Sciweavers

4052 search results - page 798 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
CCS
2004
ACM
14 years 24 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
ICNP
2003
IEEE
14 years 21 days ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
BMCBI
2007
109views more  BMCBI 2007»
13 years 7 months ago
A domain-based approach to predict protein-protein interactions
Background: Knowing which proteins exist in a certain organism or cell type and how these proteins interact with each other are necessary for the understanding of biological proce...
Mudita Singhal, Haluk Resat
BMCBI
2010
96views more  BMCBI 2010»
13 years 7 months ago
QTLminer: identifying genes regulating quantitative traits
Background: Quantitative trait locus (QTL) mapping identifies genomic regions that likely contain genes regulating a quantitative trait. However, QTL regions may encompass tens to...
Rudi Alberts, Klaus Schughart