Sciweavers

117 search results - page 22 / 24
» Computational Intelligence for Network Intrusion Detection: ...
Sort
View
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
14 years 7 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
81
Voted
BMCBI
2008
123views more  BMCBI 2008»
14 years 9 months ago
Validation of protein models by a neural network approach
Background: The development and improvement of reliable computational methods designed to evaluate the quality of protein models is relevant in the context of protein structure re...
Paolo Mereghetti, Maria Luisa Ganadu, Elena Papale...
ATAL
2003
Springer
15 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
JUCS
2008
166views more  JUCS 2008»
14 years 9 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
BMCBI
2011
14 years 1 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...