Sciweavers

280 search results - page 38 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
BMCBI
2008
107views more  BMCBI 2008»
13 years 7 months ago
A mixture model approach to sample size estimation in two-sample comparative microarray experiments
Background: Choosing the appropriate sample size is an important step in the design of a microarray experiment, and recently methods have been proposed that estimate sample sizes ...
Tommy S. Jørstad, Herman Midelfart, Atle M....
PGLDB
2003
151views Database» more  PGLDB 2003»
13 years 9 months ago
Web-service-based, Dynamic and Collaborative E-learning
This paper describes an on-going effort to investigate problems and approaches for achieving Web-service-based, dynamic and collaborative e-learning. In this work, a Learning Cont...
Stanley Y. W. Su, Gilliean Lee
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
CVPR
2011
IEEE
13 years 3 months ago
Tracking 3D Human Pose with Large Root Node Uncertainty
Representing articulated objects as a graphical model has gained much popularity in recent years, often the root node of the graph describes the global position and orientation of...
Ben Daubney, Xianghua Xie
MOBIHOC
2005
ACM
14 years 7 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...