Sciweavers

1242 search results - page 220 / 249
» Digital Objects as Passwords
Sort
View
72
Voted
CCS
2009
ACM
15 years 4 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
70
Voted
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 4 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
GECCO
2009
Springer
15 years 4 months ago
Multiobjectivization for parameter estimation: a case-study on the segment polarity network of drosophila
Mathematical modeling for gene regulative networks (GRNs) provides an effective tool for hypothesis testing in biology. A necessary step in setting up such models is the estimati...
Tim Hohm, Eckart Zitzler
WIKIS
2009
ACM
15 years 4 months ago
Measuring the wikisphere
Due to the inherent difficulty in obtaining experimental data from wikis, past quantitative wiki research has largely been focused on Wikipedia, limiting the degree that it can be...
Jeff Stuckman, James Purtilo
66
Voted
EDBT
2010
ACM
188views Database» more  EDBT 2010»
15 years 4 months ago
Subsumption and complementation as data fusion operators
The goal of data fusion is to combine several representations of one real world object into a single, consistent representation, e.g., in data integration. A very popular operator...
Jens Bleiholder, Sascha Szott, Melanie Herschel, F...