Sciweavers

6104 search results - page 1096 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
125
Voted
ITNG
2008
IEEE
15 years 10 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
166
Voted
BMCBI
2011
14 years 7 months ago
Assessing the functional coherence of modules found in multiple-evidence networks from Arabidopsis
Background: Combining multiple evidence-types from different information sources has the potential to reveal new relationships in biological systems. The integrated information ca...
Artem Lysenko, Michael Defoin-Platel, Keywan Hassa...
CVPR
2009
IEEE
16 years 10 months ago
Learning To Detect Unseen Object Classes by Between-Class Attribute Transfer
We study the problem of object classification when training and test classes are disjoint, i.e. no training examples of the target classes are available. This setup has hardly be...
Christoph H. Lampert, Hannes Nickisch, Stefan Harm...
RAID
2004
Springer
15 years 8 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
119
Voted
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
15 years 4 months ago
Multi-way Clustering on Relation Graphs
A number of real-world domains such as social networks and e-commerce involve heterogeneous data that describes relations between multiple classes of entities. Understanding the n...
Arindam Banerjee, Sugato Basu, Srujana Merugu
« Prev « First page 1096 / 1221 Last » Next »