Sciweavers

196 search results - page 29 / 40
» Examining risk attitudes
Sort
View
TCS
2002
14 years 11 months ago
A unified language processing methodology
This paper discusses a mathematical concept of language that models both artificial and natural languages and thus provides a framework for a unified language processing methodolo...
Teodor Rus
CMS
2006
15 years 1 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
BMCBI
2010
123views more  BMCBI 2010»
14 years 12 months ago
Prediction of breast cancer prognosis using gene set statistics provides signature stability and biological context
Background: Different microarray studies have compiled gene lists for predicting outcomes of a range of treatments and diseases. These have produced gene lists that have little ov...
Gad Abraham, Adam Kowalczyk, Sherene Loi, Izhak Ha...
WWW
2009
ACM
16 years 12 days ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
CCS
2008
ACM
15 years 1 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...