Sciweavers

271 search results - page 12 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
GLOBECOM
2010
IEEE
13 years 5 months ago
Cognitive Network Inference through Bayesian Network Analysis
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios ...
Giorgio Quer, Hemanth Meenakshisundaram, Tamma Bhe...
VLDB
2001
ACM
100views Database» more  VLDB 2001»
14 years 4 days ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
WEBI
2009
Springer
14 years 8 days ago
Estimating Ad Clickthrough Rate through Query Intent Analysis
Clickthrough rate and cost-per-click are known to be among the factors that impact the rank of an ad shown on a search result page. Hence, search engines can benefit from estimat...
Azin Ashkan, Charles L. A. Clarke, Eugene Agichtei...
BMCBI
2007
81views more  BMCBI 2007»
13 years 7 months ago
PADB : Published Association Database
Background: Although molecular pathway information and the International HapMap Project data can help biomedical researchers to investigate the aetiology of complex diseases more ...
Hwanseok Rhee, Jin-Sung Lee