Sciweavers

2503 search results - page 323 / 501
» Building Computer Network Attacks
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
15 years 1 months ago
A joint model of regulatory and metabolic networks
Background: Gene regulation and metabolic reactions are two primary activities of life. Although many works have been dedicated to study each system, the coupling between them is ...
Chen-Hsiang Yeang, Martin Vingron
133
Voted
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
15 years 8 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
146
Voted
ASPLOS
1992
ACM
15 years 5 months ago
High Speed Switch Scheduling for Local Area Networks
Current technology trends make it possible to build communication networks that can support high performance distributed computing. This paper describes issues in the design of a ...
Thomas E. Anderson, Susan S. Owicki, James B. Saxe...
BMCBI
2008
201views more  BMCBI 2008»
15 years 1 months ago
A copula method for modeling directional dependence of genes
Background: Genes interact with each other as basic building blocks of life, forming a complicated network. The relationship between groups of genes with different functions can b...
Jong-Min Kim, Yoon-Sung Jung, Engin A. Sungur, Kap...
IMC
2009
ACM
15 years 8 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...