Sciweavers

145 search results - page 26 / 29
» The Maximum Distinguishing Number of a Group
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 11 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
BMCBI
2007
173views more  BMCBI 2007»
13 years 7 months ago
Recursive Cluster Elimination (RCE) for classification and feature selection from gene expression data
Background: Classification studies using gene expression datasets are usually based on small numbers of samples and tens of thousands of genes. The selection of those genes that a...
Malik Yousef, Segun Jung, Louise C. Showe, Michael...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JPDC
2006
133views more  JPDC 2006»
13 years 7 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
JIB
2007
172views more  JIB 2007»
13 years 7 months ago
The ABC (Analysing Biomolecular Contacts)-database
As protein-protein interactions are one of the basic mechanisms in most cellular processes, it is desirable to understand the molecular details of protein-protein contacts and ult...
Peter Walter, Sam Ansari, Volkhard Helms