Sciweavers

108 search results - page 14 / 22
» Identifying sufficient statistics in information networks
Sort
View
VIZSEC
2004
Springer
14 years 2 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
BMCBI
2010
223views more  BMCBI 2010»
13 years 4 months ago
MetNetGE: interactive views of biological networks and ontologies
Background: Linking high-throughput experimental data with biological networks is a key step for understanding complex biological systems. Currently, visualization tools for large...
Ming Jia, Suh-Yeon Choi, Dirk Reiners, Eve Syrkin ...
CASCON
2003
103views Education» more  CASCON 2003»
13 years 10 months ago
Spatialized audioconferencing: what are the benefits?
Audioconference participants often have difficulty identifying the voices of other conferees, especially in ad hoc groups of unfamiliar members. Simultaneous presentation of multi...
Ryan Kilgore, Mark H. Chignell, Paul Smith
BMCBI
2008
147views more  BMCBI 2008»
13 years 9 months ago
Transmembrane helix prediction using amino acid property features and latent semantic analysis
Background: Prediction of transmembrane (TM) helices by statistical methods suffers from lack of sufficient training data. Current best methods use hundreds or even thousands of f...
Madhavi Ganapathiraju, Narayanas Balakrishnan, Raj...
CN
2004
111views more  CN 2004»
13 years 8 months ago
Edge-to-edge measurement-based distributed network monitoring
Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and ...
Ahsan Habib, Maleq Khan, Bharat K. Bhargava