Sciweavers

244 search results - page 49 / 49
» Computer systems availability evaluation using a segregated ...
Sort
View
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
BMCBI
2005
116views more  BMCBI 2005»
13 years 7 months ago
WEBnm@: a web application for normal mode analyses of proteins
Background: Normal mode analysis (NMA) has become the method of choice to investigate the slowest motions in macromolecular systems. NMA is especially useful for large biomolecula...
Siv Midtun Hollup, Gisle Sælensminde, Nathal...
SIGMETRICS
2012
ACM
283views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Renewable and cooling aware workload management for sustainable data centers
The demand for data center computing increased significantly in recent years resulting in huge energy consumption. Data centers typically comprise three main subsystems: IT equip...
Zhenhua Liu, Yuan Chen, Cullen Bash, Adam Wierman,...
JIB
2006
220views more  JIB 2006»
13 years 7 months ago
An assessment of machine and statistical learning approaches to inferring networks of protein-protein interactions
Protein-protein interactions (PPI) play a key role in many biological systems. Over the past few years, an explosion in availability of functional biological data obtained from hi...
Fiona Browne, Haiying Wang, Huiru Zheng, Francisco...