Sciweavers

280 search results - page 47 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
COOPIS
2004
IEEE
13 years 11 months ago
Performance Evaluation of JXTA Rendezvous
Project JXTA is the first peer-to-peer application development infrastructure, consisting of standard protocols and multi-language implementations. A JXTA peer network is a comple...
Emir Halepovic, Ralph Deters, Bernard Traversat
ICPR
2010
IEEE
13 years 7 months ago
The Binormal Assumption on Precision-Recall Curves
—The precision-recall curve (PRC) has become a widespread conceptual basis for assessing classification performance. The curve relates the positive predictive value of a classi...
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno ...
AOSD
2007
ACM
13 years 11 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
INFOCOM
2011
IEEE
12 years 11 months ago
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions
—Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder mani...
Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao ...
BMCBI
2010
190views more  BMCBI 2010»
13 years 7 months ago
Sample size and statistical power considerations in high-dimensionality data settings: a comparative study of classification alg
Background: Data generated using `omics' technologies are characterized by high dimensionality, where the number of features measured per subject vastly exceeds the number of...
Yu Guo, Armin Graber, Robert N. McBurney, Raji Bal...