Sciweavers

2795 search results - page 382 / 559
» Recommendations on recommendations
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
AICT
2006
IEEE
109views Communications» more  AICT 2006»
14 years 3 months ago
Experiences in Deploying Services within the Axis Container
The Web Services framework, since it leverages the Service Oriented Architecture model, enables the development of applications that are loosely coupled and easier to manage. A We...
Beytullah Yildiz, Shrideep Pallickara, Geoffrey Fo...
BIBE
2006
IEEE
132views Bioinformatics» more  BIBE 2006»
14 years 3 months ago
Simplicity in RNA Secondary Structure Alignment: Towards biologically plausible alignments
Ribonucleic acid (RNA) molecules contain the genetic information that regulates the functions of organisms. Given two different molecules, a preserved function corresponds to a pr...
Rimon Mikhaiel, Guohui Lin, Eleni Stroulia
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
14 years 3 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
14 years 3 months ago
An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of in...
Rajanish Dass, Ambuj Mahanti