Sciweavers

1323 search results - page 262 / 265
» Updatable Security Views
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
BMCBI
2007
112views more  BMCBI 2007»
13 years 7 months ago
Integrated olfactory receptor and microarray gene expression databases
Background: Gene expression patterns of olfactory receptors (ORs) are an important component of the signal encoding mechanism in the olfactory system since they determine the inte...
Nian Liu, Chiquito J. Crasto, Minghong Ma
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
CCR
2007
110views more  CCR 2007»
13 years 7 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
TSE
2008
148views more  TSE 2008»
13 years 7 months ago
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely ident...
Stefan Lessmann, Bart Baesens, Christophe Mues, Sw...