Sciweavers

211 search results - page 24 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
CPE
1994
Springer
170views Hardware» more  CPE 1994»
15 years 8 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
IWCMC
2006
ACM
15 years 10 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
138
Voted
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 5 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
EDM
2009
147views Data Mining» more  EDM 2009»
15 years 2 months ago
Using Dirichlet priors to improve model parameter plausibility
Student modeling is a widely used approach to make inference about a student's attributes like knowledge, learning, etc. If we wish to use these models to analyze and better u...
Dovan Rai, Yue Gong, Joseph Beck
CISIS
2010
IEEE
15 years 2 months ago
Modeling of Stress-induced Regulatory Cascades Involving Transcription Factor Dimers
Regulatory cascades consisting of stress-induced gene modules and their transcriptional regulators were recently identified and quantitatively modeled using Artificial Neural Netwo...
Maria Manioudaki, Panayiota Poirazi