Sciweavers

499 search results - page 48 / 100
» A Study on Latent Vulnerabilities
Sort
View
96
Voted
COLING
2010
14 years 7 months ago
Word Space Modeling for Measuring Semantic Specificity in Chinese
The aim of this study is to use the word-space model to measure the semantic loads of single verbs, profile verbal lexicon acquisition, and explore the semantic information on Chi...
Ching-Fen Pan, Shu-Kai Hsieh
94
Voted
IJNSEC
2010
116views more  IJNSEC 2010»
14 years 7 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
96
Voted
SIAMAM
2010
194views more  SIAMAM 2010»
14 years 7 months ago
An Age-Structured Model for the Transmission Dynamics of Hepatitis B
Hepatitis B virus (HBV) infection is endemic in many parts of the world. One of the characteristics of HBV transmission is the age structure of the host population. In this paper, ...
Lan Zou, Shigui Ruan, Weinian Zhang
123
Voted
ML
2012
ACM
385views Machine Learning» more  ML 2012»
13 years 8 months ago
An alternative view of variational Bayes and asymptotic approximations of free energy
Bayesian learning, widely used in many applied data-modeling problems, is often accomplished with approximation schemes because it requires intractable computation of the posterio...
Kazuho Watanabe
SAC
2009
ACM
15 years 7 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura