Sciweavers

6574 search results - page 92 / 1315
» Current Signatures: Application
Sort
View
133
Voted
AI
2010
Springer
15 years 27 days ago
Logic-based ontology comparison and module extraction, with an application to DL-Lite
We develop a formal framework for comparing different versions of ontologies, and apply it to ontologies formulated in terms of DL-Lite, a family of `lightweight' description...
Roman Kontchakov, Frank Wolter, Michael Zakharyasc...
BMCBI
2005
140views more  BMCBI 2005»
15 years 20 days ago
Dissecting systems-wide data using mixture models: application to identify affected cellular processes
Background: Functional analysis of data from genome-scale experiments, such as microarrays, requires an extensive selection of differentially expressed genes. Under many condition...
J. Peter Svensson, Renée X. de Menezes, Ing...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 1 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 7 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ACSAC
2005
IEEE
15 years 6 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop