Sciweavers

280 search results - page 2 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
SIGIR
2010
ACM
13 years 9 months ago
Understanding web browsing behaviors through Weibull analysis of dwell time
Dwell time on Web pages has been extensively used for various information retrieval tasks. However, some basic yet important questions have not been sufficiently addressed, e.g., ...
Chao Liu, Ryen W. White, Susan T. Dumais
BMCBI
2004
128views more  BMCBI 2004»
13 years 5 months ago
Structural characterization of genomes by large scale sequence-structure threading: application of reliability analysis in struc
Background: We establish that the occurrence of protein folds among genomes can be accurately described with a Weibull function. Systems which exhibit Weibull character can be int...
Artem Cherkasov, Shannan J. Ho Sui, Robert C. Brun...
TR
2008
98views more  TR 2008»
13 years 5 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
EUROPAR
2005
Springer
13 years 10 months ago
Modeling Machine Availability in Enterprise and Wide-Area Distributed Computing Environments
In this paper, we consider the problem of modeling machine availability in enterprise-area and wide-area distributed computing settings. Using availability data gathered from three...
Daniel Nurmi, John Brevik, Richard Wolski
DASC
2006
IEEE
13 years 11 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...