Sciweavers

741 search results - page 30 / 149
» Tools and techniques for Network Forensics
Sort
View
BMCBI
2008
208views more  BMCBI 2008»
13 years 9 months ago
GraphFind: enhancing graph searching by low support data mining techniques
Background: Biomedical and chemical databases are large and rapidly growing in size. Graphs naturally model such kinds of data. To fully exploit the wealth of information in these...
Alfredo Ferro, Rosalba Giugno, Misael Mongiov&igra...
CCIA
2007
Springer
14 years 3 months ago
Mendelian error detection in complex pedigrees using weighted constraint satisfaction techniques
With the arrival of high throughput genotyping techniques, the detection of likely genotyping errors is becoming an increasingly important problem. In this paper we are interested...
Martí Sánchez, Simon de Givry, Thoma...
ACOM
2006
Springer
14 years 2 months ago
Towards Design Tools for Protocol Development
Interaction protocols enable agents to communicate with each other effectively. Whereas several approaches exist to specify interaction protocols, none of them has design tools th...
Pinar Yolum
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 9 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 2 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao