Sciweavers

9405 search results - page 1757 / 1881
» Computing a Model of Set Theory
Sort
View
RAID
2005
Springer
15 years 9 months ago
Anomalous Payload-Based Worm Detection and Signature Generation
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates tha...
Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo
133
Voted
SEMWEB
2005
Springer
15 years 9 months ago
A Bayesian Network Approach to Ontology Mapping
This paper presents our ongoing effort on developing a principled methodology for automatic ontology mapping based on BayesOWL, a probabilistic framework we developed for modeling ...
Rong Pan, Zhongli Ding, Yang Yu, Yun Peng
122
Voted
WABI
2005
Springer
15 years 9 months ago
Time-Window Analysis of Developmental Gene Expression Data with Multiple Genetic Backgrounds
d Abstract] Tamir Tuller , Efrat Oron , Erez Makavy , Daniel A. Chamovitz † , and Benny Chor ‡ Tel-Aviv University, Tel-Aviv 69978, Israel. Abstract. We study gene expression d...
Tamir Tuller, Efrat Oron, Erez Makavy, Daniel A. C...
116
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
Optimizing cost and performance for multihoming
Multihoming is often used by large enterprises and stub ISPs to connect to the Internet. In this paper, we design a series of novel smart routing algorithms to optimize cost and p...
David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie 00...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
« Prev « First page 1757 / 1881 Last » Next »