Sciweavers

495 search results - page 73 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICIP
2007
IEEE
14 years 11 months ago
Mining Auxiliary Objects for Tracking by Multibody Grouping
On-line discovery of some auxiliary objects to verify the tracking results is a novel approach to achieving robust tracking by balancing the need for strong verification and compu...
Ming Yang, Ying Wu, Shihong Lao
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Discover True Association Rates in Multi-protein Complex Proteomics Data Sets
Experimental processes to collect and process proteomics data are increasingly complex, while the computational methods to assess the quality and significance of these data remain...
Changyu Shen, Lang Li, Jake Yue Chen
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 11 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
SAC
2010
ACM
14 years 4 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
ICDCS
2008
IEEE
14 years 4 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion