Sciweavers

2004 search results - page 356 / 401
» Sampling from large graphs
Sort
View
WORM
2004
13 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
IJON
2006
95views more  IJON 2006»
13 years 10 months ago
Ensemble classifiers based on correlation analysis for DNA microarray classification
Since accurate classification of DNA microarray is a very important issue for the treatment of cancer, it is more desirable to make a decision by combining the results of various ...
Kyung-Joong Kim, Sung-Bae Cho
BMCBI
2005
93views more  BMCBI 2005»
13 years 9 months ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du
WWW
2011
ACM
13 years 4 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
DAC
2002
ACM
14 years 11 months ago
Solving difficult SAT instances in the presence of symmetry
Research in algorithms for Boolean satisfiability and their efficient implementations [26, 8] has recently outpaced benchmarking efforts. Most of the classic DIMACS benchmarks fro...
Fadi A. Aloul, Arathi Ramani, Igor L. Markov, Kare...