Sciweavers

1227 search results - page 212 / 246
» Symbolic data analysis tools for recommendation systems
Sort
View
AUSFORENSICS
2003
13 years 9 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
SWAP
2007
13 years 9 months ago
An Approach to Decision Support in Heart Failure
Chronic heart failure is a severe clinical syndrome among the most remarkable for prevalence and morbidity in the developed western countries. The European STREP project HEARTFAID ...
Sara Colantonio, Massimo Martinelli, Davide Moroni...
ISSTA
2006
ACM
14 years 1 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
BMCBI
2010
277views more  BMCBI 2010»
13 years 7 months ago
PCA2GO: a new multivariate statistics based method to identify highly expressed GO-Terms
Background: Several tools have been developed to explore and search Gene Ontology (GO) databases allowing efficient GO enrichment analysis and GO tree visualization. Nevertheless,...
Marc Bruckskotten, Mario Looso, Franz Cemic, Anne ...
WPES
2006
ACM
14 years 1 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...