Sciweavers

IEEEVAST
2010
12 years 11 months ago
DimStiller: Workflows for dimensional analysis and reduction
DimStiller is a system for dimensionality reduction and analysis. It frames the task of understanding and transforming input dimensions as a series of analysis steps where users t...
Stephen Ingram, Tamara Munzner, Veronika Irvine, M...
WWW
2011
ACM
12 years 11 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
TIP
2011
162views more  TIP 2011»
12 years 11 months ago
Kernel Maximum Autocorrelation Factor and Minimum Noise Fraction Transformations
—This paper introduces kernel versions of maximum autocorrelation factor (MAF) analysis and minimum noise fraction (MNF) analysis. The kernel versions are based upon a dual formu...
Allan Aasbjerg Nielsen
SNAM
2011
246views more  SNAM 2011»
12 years 11 months ago
Market basket analysis with networks
The field of market basket analysis, the search for meaningful associations in customer purchase data, is one of the oldest areas of data mining. The typical solution involves th...
Troy Raeder, Nitesh V. Chawla
JOI
2011
93views more  JOI 2011»
12 years 11 months ago
Bibliometric rankings of journals based on Impact Factors: An axiomatic approach
This paper proposes an axiomatic analysis of Impact Factors when used as tools for ranking journals. This analysis draws on the similarities between the problem of comparing distr...
Denis Bouyssou, Thierry Marchant
JOC
2011
157views more  JOC 2011»
12 years 11 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
JCSS
2011
154views more  JCSS 2011»
12 years 11 months ago
Model interoperability via Model Driven Development
It is widely recognised that software development is a complex process. Among the factors that contribute to its inherent complexity is the gap between the design and the formal a...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
COMCOM
2011
12 years 11 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
BMCBI
2011
12 years 11 months ago
Pathway-based analysis using reduced gene subsets in genome-wide association studies
Background: Single Nucleotide Polymorphism (SNP) analysis only captures a small proportion of associated genetic variants in Genome-Wide Association Studies (GWAS) partly due to s...
Jingyuan Zhao, Simone Gupta, Mark Seielstad, Jianj...
INFSOF
2010
173views more  INFSOF 2010»
13 years 1 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...