Sciweavers

711 search results - page 133 / 143
» Methodological frameworks for large-scale network analysis a...
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
MSWIM
2004
ACM
14 years 2 months ago
On utility-based radio resource management with and without service guarantees
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
Leonardo Badia, Michele Zorzi

Publication
303views
12 years 7 months ago
Evolutionary synthesis of analog networks
he significant increase in the available computational power that took place in recent decades has been accompanied by a growing interest in the application of the evolutionary ap...
Claudio Mattiussi
BMCBI
2008
129views more  BMCBI 2008»
13 years 9 months ago
A unified approach to false discovery rate estimation
Background: False discovery rate (FDR) methods play an important role in analyzing highdimensional data. There are two types of FDR, tail area-based FDR and local FDR, as well as ...
Korbinian Strimmer
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
14 years 2 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta