Sciweavers

1266 search results - page 249 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
13 years 11 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
BMCBI
2007
122views more  BMCBI 2007»
13 years 7 months ago
Dissecting complex transcriptional responses using pathway-level scores based on prior information
Background: The genomewide pattern of changes in mRNA expression measured using DNA microarrays is typically a complex superposition of the response of multiple regulatory pathway...
Harmen J. Bussemaker, Lucas D. Ward, André ...
IJCAI
1997
13 years 8 months ago
Combining Probabilistic Population Codes
We study the problemof statisticallycorrect inference in networks whose basic representations are population codes. Population codes are ubiquitous in the brain, and involve the s...
Richard S. Zemel, Peter Dayan
WWW
2009
ACM
14 years 8 months ago
QuWi: quality control in Wikipedia
We propose and evaluate QuWi (Quality in Wikipedia), a framework for quality control in Wikipedia. We build upon a previous proposal by Mizzaro [11], who proposed a method for sub...
Alberto Cusinato, Vincenzo Della Mea, Francesco Di...
CN
2008
85views more  CN 2008»
13 years 7 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...