Sciweavers

280 search results - page 17 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
JNW
2008
171views more  JNW 2008»
13 years 7 months ago
The Necessity of Semantic Technologies in Grid Discovery
Service discovery and its automation are some of the key features that a large scale, open distributed system must provide so that clients and users may take advantage of shared re...
Serena Pastore
BMCBI
2006
103views more  BMCBI 2006»
13 years 7 months ago
Cis-motifs upstream of the transcription and translation initiation sites are effectively revealed by their positional disequili
Background: The discovery of cis-regulatory motifs still remains a challenging task even though the number of sequenced genomes is constantly growing. Computational analyses using...
Kenneth W. Berendzen, Kurt Stüber, Klaus Hart...
DEXA
2005
Springer
77views Database» more  DEXA 2005»
14 years 1 months ago
An Optimal Skew-insensitive Join and Multi-join Algorithm for Distributed Architectures
Abstract. The development of scalable parallel database systems requires the design of efficient algorithms for the join operation which is the most frequent and expensive operatio...
Mostafa Bamha
KDD
2010
ACM
435views Data Mining» more  KDD 2010»
13 years 11 months ago
Topic models with power-law using Pitman-Yor process
One of the important approaches for Knowledge discovery and Data mining is to estimate unobserved variables because latent variables can indicate hidden and specific properties o...
Issei Sato, Hiroshi Nakagawa