Sciweavers

702 search results - page 131 / 141
» Identifying Graph Automorphisms Using Determining Sets
Sort
View
BMCBI
2008
132views more  BMCBI 2008»
13 years 8 months ago
Mixture models for analysis of melting temperature data
Background: In addition to their use in detecting undesired real-time PCR products, melting temperatures are useful for detecting variations in the desired target sequences. Metho...
Christoffer Nellåker, Fredrik Uhrzander, Joa...
CCS
2011
ACM
12 years 8 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
14 years 8 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
ECIR
2009
Springer
14 years 5 months ago
Joint Ranking for Multilingual Web Search
Ranking for multilingual information retrieval (MLIR) is a task to rank documents of different languages solely based on their relevancy to the query regardless of query’s langu...
Wei Gao, Cheng Niu, Ming Zhou, Kam-Fai Wong
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 1 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich