Sciweavers

1316 search results - page 26 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
67
Voted
MINENET
2006
ACM
15 years 3 months ago
How to extract BGP peering information from the internet routing registry
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: ...
Giuseppe Di Battista, Tiziana Refice, Massimo Rimo...
DSOM
2006
Springer
15 years 1 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
ISW
1997
Springer
15 years 1 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
BMCBI
2006
127views more  BMCBI 2006»
14 years 9 months ago
Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks
Background: To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to c...
Sok June Oh, Je-Gun Joung, Jeong Ho Chang, Byoung-...
78
Voted
CIBCB
2008
IEEE
15 years 4 months ago
An information theoretic approach for the discovery of irregular and repetitive patterns in genomic data
sequence content at an abstract level and offers novel ways to examine the information contained in them. Our approach is an information theoretic search process which uses patter...
Willard Davis, Ananth Kalyanaraman, Diane J. Cook