Sciweavers

1658 search results - page 298 / 332
» Learning Unknown Graphs
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 12 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ICCCN
2007
IEEE
13 years 12 months ago
Implementation of a Wireless Mesh Network Testbed for Traffic Control
Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many ...
Kun-Chan Lan, Zhe Wang, Rodney Berriman, Tim Moors...
ECAI
2006
Springer
13 years 11 months ago
Agents with Anticipatory Behaviors: To Be Cautious in a Risky Environment
This work presents some anticipatory mechanisms in an agent architecture, modeling affective behaviours as effects of surprise. Through experiment discussion, the advantages of bec...
Cristiano Castelfranchi, Rino Falcone, Michele Piu...
BMCBI
2010
171views more  BMCBI 2010»
13 years 8 months ago
PyMix - The Python mixture package - a tool for clustering of heterogeneous biological data
Background: Cluster analysis is an important technique for the exploratory analysis of biological data. Such data is often high-dimensional, inherently noisy and contains outliers...
Benjamin Georgi, Ivan Gesteira Costa, Alexander Sc...
BMCBI
2010
133views more  BMCBI 2010»
13 years 8 months ago
New components of the Dictyostelium PKA pathway revealed by Bayesian analysis of expression data
Background: Identifying candidate genes in genetic networks is important for understanding regulation and biological function. Large gene expression datasets contain relevant info...
Anup Parikh, Eryong Huang, Christopher Dinh, Blaz ...