Sciweavers

741 search results - page 85 / 149
» Tools and techniques for Network Forensics
Sort
View
BIOINFORMATICS
2007
117views more  BIOINFORMATICS 2007»
13 years 9 months ago
Mining biological networks for unknown pathways
Biological pathways provide significant insights on the interaction mechanisms of molecules. Presently, many essential pathways still remain unknown or incomplete for newly sequen...
Ali Cakmak, Gultekin Özsoyoglu
JAMIA
2011
98views more  JAMIA 2011»
12 years 11 months ago
Mapping clinical phenotype data elements to standardized metadata repositories and controlled terminologies: the eMERGE Network
Background Systematic study of clinical phenotypes is important for a better understanding of the genetic basis of human diseases and more effective gene-based disease management....
Jyotishman Pathak, Janey Wang, Sudha Kashyap, Meli...
WSC
1997
13 years 10 months ago
Petri Net Based Simulation of Construction Schedules
Scheduling of a construction project requires: a) hierarchical decomposition of the project; b) incorporation of risk and uncertainty in the activity time and cost estimates; and ...
Anil Sawhney
AINA
2007
IEEE
14 years 3 months ago
Extracting Significant Phrases from Text
Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Althou...
Yuan J. Lui, Richard Brent, Ani Calinescu
DSN
2005
IEEE
14 years 2 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...