Sciweavers

721 search results - page 116 / 145
» Biological Network Inference Using Redundancy Analysis
Sort
View
70
Voted
CCS
2009
ACM
15 years 4 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
ACSAC
2009
IEEE
15 years 4 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
WEBI
2005
Springer
15 years 3 months ago
Multi-Faceted Information Retrieval System for Large Scale Email Archives
We profile a system for search and analysis of largescale email archives. The system builds around four facets: Content-based search engine, statistical topic model, automaticall...
Jukka Perkiö, Ville H. Tuulos, Wray L. Buntin...
JSAC
2006
167views more  JSAC 2006»
14 years 9 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
BMCBI
2005
125views more  BMCBI 2005»
14 years 9 months ago
Multiple sequence alignments of partially coding nucleic acid sequences
Background: High quality sequence alignments of RNA and DNA sequences are an important prerequisite for the comparative analysis of genomic sequence data. Nucleic acid sequences, ...
Roman R. Stocsits, Ivo L. Hofacker, Claudia Fried,...