Sciweavers

3758 search results - page 562 / 752
» A Complete Subsumption Algorithm
Sort
View
101
Voted
IWCMC
2006
ACM
15 years 4 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
JCDL
2006
ACM
172views Education» more  JCDL 2006»
15 years 4 months ago
A comprehensive comparison study of document clustering for a biomedical digital library MEDLINE
Document clustering has been used for better document retrieval, document browsing, and text mining in digital library. In this paper, we perform a comprehensive comparison study ...
Illhoi Yoo, Xiaohua Hu
SACMAT
2006
ACM
15 years 4 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
ACSC
2005
IEEE
15 years 3 months ago
Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading
We introduce a new approach to computing interprocedural modification side effects for Java programs in the presence of dynamic class loading. When compile-time unknown classes c...
Phung Hua Nguyen, Jingling Xue
BIBE
2005
IEEE
15 years 3 months ago
Improved Phylogenetic Motif Detection Using Parsimony
We have recently demonstrated (La et al, Proteins, 58:2005) that sequence fragments approximating the overall familial phylogeny, called phylogenetic motifs (PMs), represent a pro...
Usman Roshan, Dennis R. Livesay, David La