Sciweavers

412 search results - page 47 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
109
Voted
RAID
2009
Springer
15 years 7 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
ICWS
2009
IEEE
15 years 9 months ago
An Approach to Incentive-Based Reputation for Communities of Web Services
—Community of web services (CWS) is a society composed by a number of functionally identical web services. The communities always aim to increase their reputation level in order ...
Babak Khosravifar, Jamal Bentahar, Philippe Thiran...
AI
2002
Springer
15 years 12 days ago
Learning Bayesian networks from data: An information-theory based approach
This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop e...
Jie Cheng, Russell Greiner, Jonathan Kelly, David ...
106
Voted
BMCBI
2008
129views more  BMCBI 2008»
15 years 19 days ago
A unified approach to false discovery rate estimation
Background: False discovery rate (FDR) methods play an important role in analyzing highdimensional data. There are two types of FDR, tail area-based FDR and local FDR, as well as ...
Korbinian Strimmer
107
Voted
COMCOM
2008
154views more  COMCOM 2008»
15 years 19 days ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan