Sciweavers

459 search results - page 54 / 92
» Detecting Spam at the Network Level
Sort
View
GIS
2009
ACM
13 years 11 months ago
Opportunistic sampling in wireless sensor networks
In an active WSN where user queries are regularly processed, a significant proportion of nodes relay and overhear data generated by other nodes in the network. In this paper, we ...
Muhammad Umer, Egemen Tanin, Lars Kulik
CCGRID
2005
IEEE
14 years 1 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
14 years 2 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...