Sciweavers

40 search results - page 4 / 8
» Declarative analysis of noisy information networks
Sort
View
DSOM
2006
Springer
14 years 7 days ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
ITNG
2007
IEEE
14 years 2 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
BMCBI
2006
118views more  BMCBI 2006»
13 years 8 months ago
Predicting the effect of missense mutations on protein function: analysis with Bayesian networks
Background: A number of methods that use both protein structural and evolutionary information are available to predict the functional consequences of missense mutations. However, ...
Chris J. Needham, James R. Bradford, Andrew J. Bul...
CIKM
2009
Springer
14 years 3 months ago
Networks, communities and kronecker products
Emergence of the web and online computing applications gave rise to rich large scale social activity data. One of the principal challenges then is to build models and understandin...
Jure Leskovec
CNSR
2011
IEEE
257views Communications» more  CNSR 2011»
13 years 3 days ago
On Threshold Selection for Principal Component Based Network Anomaly Detection
—Principal component based anomaly detection has emerged as an important statistical tool for network anomaly detection. It works by projecting summary network information onto a...
Petar Djukic, Biswajit Nandy