Sciweavers

2006 search results - page 128 / 402
» MUC-5 evaluation metrics
Sort
View
CCS
2007
ACM
14 years 4 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
BROADNETS
2006
IEEE
14 years 4 months ago
Multipath Selection in Multi-radio Mesh Networks
Research has shown that multi-radio multi-channel mesh networks provide significant capacity gains over single-radio mesh networks [10, 20, 21]. Traditional single path routing c...
Irfan Sheriff, Elizabeth M. Belding-Royer
DSN
2006
IEEE
14 years 4 months ago
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms
We present three algorithms for detecting the need for software rejuvenation by monitoring the changing values of a customer-affecting performance metric, such as response time. A...
Alberto Avritzer, Andre B. Bondi, Michael Grottke,...
SRDS
2006
IEEE
14 years 4 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...
ADMA
2006
Springer
121views Data Mining» more  ADMA 2006»
14 years 4 months ago
A New Polynomial Time Algorithm for Bayesian Network Structure Learning
We propose a new algorithm called SCD for learning the structure of a Bayesian network. The algorithm is a kind of constraintbased algorithm. By taking advantage of variable orderi...
Sanghack Lee, Jihoon Yang, Sungyong Park