Sciweavers

1080 search results - page 48 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
111
Voted
HICSS
2010
IEEE
142views Biometrics» more  HICSS 2010»
15 years 10 months ago
DQ Tags and Decision-Making
It has been suggested that metadata describing data quality (DQ), termed DQ tags, be made available in situations where decision-makers are unfamiliar with the data context, for e...
Rosanne Price, Graeme G. Shanks
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 10 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
151
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
CCS
2006
ACM
15 years 7 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
BMCBI
2006
150views more  BMCBI 2006»
15 years 3 months ago
Instance-based concept learning from multiclass DNA microarray data
Background: Various statistical and machine learning methods have been successfully applied to the classification of DNA microarray data. Simple instance-based classifiers such as...
Daniel P. Berrar, Ian Bradbury, Werner Dubitzky