Sciweavers

418 search results - page 71 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
WWW
2010
ACM
14 years 3 months ago
Exploring web scale language models for search query processing
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...
Jian Huang 0002, Jianfeng Gao, Jiangbo Miao, Xiaol...
BMCBI
2010
183views more  BMCBI 2010»
13 years 5 months ago
The complexity of gene expression dynamics revealed by permutation entropy
Background: High complexity is considered a hallmark of living systems. Here we investigate the complexity of temporal gene expression patterns using the concept of Permutation En...
Xiaoliang Sun, Yong Zou, Victoria J. Nikiforova, J...
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
13 years 9 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...
WWW
2004
ACM
14 years 8 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda