Sciweavers

351 search results - page 61 / 71
» Generating Java trace data
Sort
View
UAI
2008
13 years 9 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...
BIOCOMP
2006
13 years 9 months ago
Finding Molecular Signature of Prostate Cancer: An Algorithmic Approach
123 African American men in America are 65% more likely to develop prostate cancer and are two to three times more likely to die of the disease than Caucasian men [1]. While resear...
Patrick Bobbie, Renee Reams, Sandra Suther, C. Per...
PE
2007
Springer
100views Optimization» more  PE 2007»
13 years 8 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
ICAC
2006
IEEE
14 years 2 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
ACSAC
2010
IEEE
13 years 6 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...