Sciweavers

3146 search results - page 409 / 630
» Efficient Consequence Finding
Sort
View
COMCOM
2006
88views more  COMCOM 2006»
15 years 3 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
BMCBI
2007
153views more  BMCBI 2007»
15 years 3 months ago
Lower bounds on multiple sequence alignment using exact 3-way alignment
Background: Multiple sequence alignment is fundamental. Exponential growth in computation time appears to be inevitable when an optimal alignment is required for many sequences. E...
Charles J. Colbourn, Sudhir Kumar
BMCBI
2007
109views more  BMCBI 2007»
15 years 3 months ago
Discarding duplicate ditags in LongSAGE analysis may introduce significant error
Background: During gene expression analysis by Serial Analysis of Gene Expression (SAGE), duplicate ditags are routinely removed from the data analysis, because they are suspected...
Jeppe Emmersen, Anna M. Heidenblut, Annabeth Laurs...
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 3 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
JAIR
2008
104views more  JAIR 2008»
15 years 3 months ago
On the Qualitative Comparison of Decisions Having Positive and Negative Features
Making a decision is often a matter of listing and comparing positive and negative arguments. In such cases, the evaluation scale for decisions should be considered bipolar, that ...
Didier Dubois, Hélène Fargier, Jean-...