Sciweavers

495 search results - page 6 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICTAI
2009
IEEE
14 years 2 months ago
Probabilistic Neural Logic Network Learning: Taking Cues from Neuro-Cognitive Processes
This paper describes an attempt to devise a knowledge discovery model that is inspired from the two theoretical frameworks of selectionism and constructivism in human cognitive le...
Henry Wai Kit Chia, Chew Lim Tan, Sam Yuan Sung
RECOMB
2004
Springer
14 years 8 months ago
Probabilistic discovery of overlapping cellular processes and their regulation
In this paper, we explore modeling overlapping biological processes. We discuss a probabilistic model of overlapping biological processes, gene membership in those processes, and ...
Alexis Battle, Eran Segal, Daphne Koller