Sciweavers

211 search results - page 13 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
BMCBI
2006
160views more  BMCBI 2006»
13 years 7 months ago
Gene prediction in eukaryotes with a generalized hidden Markov model that uses hints from external sources
Background: In order to improve gene prediction, extrinsic evidence on the gene structure can be collected from various sources of information such as genome-genome comparisons an...
Mario Stanke, Oliver Schöffmann, Burkhard Mor...
SIGIR
2008
ACM
13 years 7 months ago
Intuition-supporting visualization of user's performance based on explicit negative higher-order relevance
Modeling the beyond-topical aspects of relevance are currently gaining popularity in IR evaluation. For example, the discounted cumulated gain (DCG) measure implicitly models some...
Heikki Keskustalo, Kalervo Järvelin, Ari Pirk...
PAM
2010
Springer
14 years 2 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
SAC
2010
ACM
14 years 2 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz