Sciweavers

274 search results - page 14 / 55
» Improving vulnerability discovery models
Sort
View
ICDM
2007
IEEE
133views Data Mining» more  ICDM 2007»
14 years 2 months ago
Topical N-Grams: Phrase and Topic Discovery, with an Application to Information Retrieval
Most topic models, such as latent Dirichlet allocation, rely on the bag-of-words assumption. However, word order and phrases are often critical to capturing the meaning of text in...
Xuerui Wang, Andrew McCallum, Xing Wei
JISE
2010
110views more  JISE 2010»
13 years 2 months ago
SOA-based Service Layering for Facilitating Dynamic Service Composition and Alternative Service Discovery
abstraction for ubiquitous computing. The key to service modeling of SOA-based systems is in classifying services into business, application, and orchestration layers. However, ser...
Meeyeon Lee, Jung-Won Lee, Seung Soo Park, We-Duke...
BIOCOMP
2007
13 years 9 months ago
Biomarker Discovery Across Annotated and Unannotated Microarray Datasets Using Semi-Supervised Learning
The growing body of DNA microarray data has the potential to advance our understanding of the molecular basis of disease. However annotating microarray datasets with clinically us...
Cole Harris, Noushin Ghaffari
APSCC
2008
IEEE
14 years 2 months ago
Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network
—Vehicular ad hoc network protocol with hybrid relay architecture is proposed for improving the success ratio. Access gateway estimation and a probability table based on the rout...
Shang-Pin Sheng, Ben-Yue Chang, Hung-Yu Wei
NDSS
2005
IEEE
14 years 1 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell