Sciweavers

390 search results - page 78 / 78
» A Time Series Analysis of Microarray Data
Sort
View
ESORICS
2004
Springer
13 years 11 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
CIKM
2011
Springer
12 years 5 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
TSP
2008
157views more  TSP 2008»
13 years 5 months ago
A Two-Stage Approach to Estimate the Angles of Arrival and the Angular Spreads of Locally Scattered Sources
We propose a new two-stage approach to estimate the nominal angles of arrival (AoAs) and the angular spreads (ASs) of multiple locally scattered sources using a uniform linear arra...
Mehrez Souden, Sofiène Affes, Jacob Benesty
ENTCS
2002
90views more  ENTCS 2002»
13 years 5 months ago
Inorder traversal of splay trees
Splay trees, a form of self-adjusting binary tree, were introduced by Sleator and Tarjan in the early 1980s. Their main use is to store ordered lists. The idea is to keep the tree...
Colm Ó'Dúnlaing
JUCS
2006
225views more  JUCS 2006»
13 years 5 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke