Sciweavers

17582 search results - page 3239 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
IMC
2006
ACM
15 years 10 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 9 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
NIPS
2000
15 years 5 months ago
Learning Winner-take-all Competition Between Groups of Neurons in Lateral Inhibitory Networks
It has long been known that lateral inhibition in neural networks can lead to a winner-take-all competition, so that only a single neuron is active at a steady state. Here we show...
Xiaohui Xie, Richard H. R. Hahnloser, H. Sebastian...
CCS
2010
ACM
15 years 4 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
BMCBI
2008
173views more  BMCBI 2008»
15 years 4 months ago
Gene Vector Analysis (Geneva): A unified method to detect differentially-regulated gene sets and similar microarray experiments
Background: Microarray experiments measure changes in the expression of thousands of genes. The resulting lists of genes with changes in expression are then searched for biologica...
Stephen W. Tanner, Pankaj Agarwal
« Prev « First page 3239 / 3517 Last » Next »