Sciweavers

499 search results - page 44 / 100
» A Study on Latent Vulnerabilities
Sort
View
BMCBI
2008
118views more  BMCBI 2008»
15 years 18 days ago
Inferring transcriptional compensation interactions in yeast via stepwise structure equation modeling
Background: With the abundant information produced by microarray technology, various approaches have been proposed to infer transcriptional regulatory networks. However, few appro...
Grace S. Shieh, Chung-Ming Chen, Ching-Yun Yu, Jui...
CIKM
2010
Springer
14 years 11 months ago
Collaborative Dual-PLSA: mining distinction and commonality across multiple domains for text classification
:  Collaborative Dual-PLSA: Mining Distinction and Commonality across Multiple Domains for Text Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhon...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
ICDM
2010
IEEE
197views Data Mining» more  ICDM 2010»
14 years 10 months ago
D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-defined Classification
: D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-Defined Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhongzhi Shi HP Labo...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
95
Voted
INFSOF
2007
83views more  INFSOF 2007»
15 years 11 days ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
TISSEC
2008
106views more  TISSEC 2008»
15 years 11 days ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe