Sciweavers

1356 search results - page 41 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 11 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CSREASAM
2006
15 years 1 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
IPPS
2008
IEEE
15 years 6 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
BIRTHDAY
2003
Springer
15 years 5 months ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
BMCBI
2007
124views more  BMCBI 2007»
14 years 12 months ago
Analysis on multi-domain cooperation for predicting protein-protein interactions
Background: Domains are the basic functional units of proteins. It is believed that protein-protein interactions are realized through domain interactions. Revealing multi-domain c...
Rui-Sheng Wang, Yong Wang, Ling-Yun Wu, Xiang-Sun ...