Sciweavers

182 search results - page 36 / 37
» Do We Need Whatever More Than k-NN
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
CHI
1999
ACM
13 years 11 months ago
A Better Mythology for System Design
The past decades have seen huge improvements in computer systems but these have proved difficult to translate into comparable improvements in the usability and social integration)...
Jed Harris, D. Austin Henderson Jr.
ESOP
1990
Springer
13 years 11 months ago
Algebraic Properties of Program Integration
The need to integrate several versions of a program into a common one arises frequently, but it is a tedious and time consuming task to merge programs by hand. The program-integrat...
Thomas W. Reps
ISSA
2004
13 years 8 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
BMCBI
2007
144views more  BMCBI 2007»
13 years 7 months ago
Motif kernel generated by genetic programming improves remote homology and fold detection
Background: Protein remote homology detection is a central problem in computational biology. Most recent methods train support vector machines to discriminate between related and ...
Tony Håndstad, Arne J. H. Hestnes, Pål...