Sciweavers

344 search results - page 62 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
CCS
2003
ACM
14 years 21 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
BMCBI
2005
112views more  BMCBI 2005»
13 years 7 months ago
Integration of the Gene Ontology into an object-oriented architecture
Background: To standardize gene product descriptions, a formal vocabulary defined as the Gene Ontology (GO) has been developed. GO terms have been categorized into biological proc...
Daniel Shegogue, W. Jim Zheng
OOPSLA
2005
Springer
14 years 29 days ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
IMC
2007
ACM
13 years 9 months ago
On optimal probing for delay and loss measurement
Packet delay and loss are two fundamental measures of performance. Using active probing to measure delay and loss typically involves sending Poisson probes, on the basis of the PA...
François Baccelli, Sridhar Machiraju, Darry...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 23 days ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole