Sciweavers

280 search results - page 8 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
UAI
2008
13 years 9 months ago
Causal discovery of linear acyclic models with arbitrary distributions
An important task in data analysis is the discovery of causal relationships between observed variables. For continuous-valued data, linear acyclic causal models are commonly used ...
Patrik O. Hoyer, Aapo Hyvärinen, Richard Sche...
EOR
2007
85views more  EOR 2007»
13 years 7 months ago
Machine reliability and preventive maintenance planning for cellular manufacturing systems
The paper proposes a preventive maintenance (PM) planning model for the performance improvement of cellular manufacturing systems (CMS) in terms of machine reliability, and resour...
K. Das, R. S. Lashkari, S. Sengupta
IMC
2007
ACM
13 years 9 months ago
Understanding passive and active service discovery
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with policies ab...
Genevieve Bartlett, John S. Heidemann, Christos Pa...
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 5 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
KDD
2007
ACM
237views Data Mining» more  KDD 2007»
14 years 8 months ago
Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior
Documents, such as those seen on Wikipedia and Folksonomy, have tended to be assigned with multiple topics as a meta-data. Therefore, it is more and more important to analyze a re...
Issei Sato, Hiroshi Nakagawa