Sciweavers

274 search results - page 43 / 55
» Improving vulnerability discovery models
Sort
View
W2GIS
2007
Springer
14 years 1 months ago
Towards the Geo-spatial Querying of the Semantic Web with ONTOAST
One of the challenges raised by the construction of the semantic Web lies in the analysis and management of complex relationships (thematic, spatial and temporal) connecting severa...
Alina Dia Miron, Jérôme Gensel, Marl&...
BMCBI
2006
91views more  BMCBI 2006»
13 years 7 months ago
Empirical study of supervised gene screening
Background: Microarray studies provide a way of linking variations of phenotypes with their genetic causations. Constructing predictive models using high dimensional microarray me...
Shuangge Ma
ICCV
2011
IEEE
12 years 7 months ago
Discovering Object Instances from Scenes of Daily Living
We propose an approach to identify and segment objects from scenes that a person (or robot) encounters in Activities of Daily Living (ADL). Images collected in those cluttered sce...
Hongwen Kang, Martial Hebert, Takeo Kanade
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 1 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...