Sciweavers

495 search results - page 54 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CCS
2011
ACM
12 years 9 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
EGC
2005
Springer
14 years 3 months ago
OpenMolGRID: Using Automated Workflows in GRID Computing Environment
Quantitative Structure Activity/Property Relationship (QSAR/QSPR) model development is a complex and time-consuming procedure involving data gathering and preparation. It plays an ...
Sulev Sild, Uko Maran, Mathilde Romberg, Bernd Sch...
COGSCI
2002
99views more  COGSCI 2002»
13 years 9 months ago
Learning words from sights and sounds: a computational model
This paper presents an implemented computational model of word acquisition which learns directly from raw multimodal sensory input. Set in an information theoretic framework, the ...
Deb Roy, Alex Pentland
IV
2003
IEEE
111views Visualization» more  IV 2003»
14 years 3 months ago
A Model of Synchronous Collaborative Information Visualization
In this paper we describe a model of the process by which people solve problems using information visualization systems. The model was based on video analysis of forty dyads who p...
Gloria Mark, Keri Carpenter, Alfred Kobsa
ICASSP
2011
IEEE
13 years 1 months ago
Time-evolving modeling of social networks
A statistical framework for modeling and prediction of binary matrices is presented. The method is applied to social network analysis, specifically the database of US Supreme Cou...
Eric Wang, Jorge Silva, Rebecca Willett, Lawrence ...