Sciweavers

532 search results - page 96 / 107
» Test Data Compression: The System Integrator's Perspective
Sort
View
AWIC
2004
Springer
13 years 10 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
CCS
2010
ACM
13 years 4 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
BMCBI
2008
121views more  BMCBI 2008»
13 years 6 months ago
OntoDas - a tool for facilitating the construction of complex queries to the Gene Ontology
Background: Ontologies such as the Gene Ontology can enable the construction of complex queries over biological information in a conceptual way, however existing systems to do thi...
Kieran O'Neill, Alexander García Castro, An...
SSDBM
2011
IEEE
257views Database» more  SSDBM 2011»
12 years 10 months ago
Database-as-a-Service for Long-Tail Science
Database technology remains underused in science, especially in the long tail  the small labs and individual researchers that collectively produce the majority of scientic output...
Bill Howe, Garrett Cole, Emad Souroush, Paraschos ...
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
13 years 10 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...