Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
Scheduling/prioritization of DBMS transactions is important for many applications that rely on database backends. A convenient way to achieve scheduling is to limit the number of ...
Bianca Schroeder, Mor Harchol-Balter, Arun Iyengar...
Natural scene categorization of images represents a very useful task for automatic image analysis systems in a wide variety of applications. In the literature, several methods hav...
Alessandro Perina, Marco Cristani, Vittorio Murino