Sciweavers

215 search results - page 37 / 43
» Using circuit structural analysis techniques for networks in...
Sort
View
CCS
2003
ACM
14 years 21 days ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
PROMISE
2010
13 years 2 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...
CCGRID
2009
IEEE
14 years 2 months ago
Towards Visualization Scalability through Time Intervals and Hierarchical Organization of Monitoring Data
Highly distributed systems such as Grids are used today to the execution of large-scale parallel applications. The behavior analysis of these applications is not trivial. The comp...
Lucas Mello Schnorr, Guillaume Huard, Philippe Oli...
BMCBI
2006
182views more  BMCBI 2006»
13 years 7 months ago
A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for Drosophila
Background: Biological processes are mediated by networks of interacting genes and proteins. Efforts to map and understand these networks are resulting in the proliferation of int...
Svetlana Pacifico, Guozhen Liu, Stephen Guest, Jod...