Sciweavers

1370 search results - page 270 / 274
» Hierarchical analysis of GSM network performance data
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
BMCBI
2007
148views more  BMCBI 2007»
14 years 9 months ago
Evaluation of gene-expression clustering via mutual information distance measure
Background: The definition of a distance measure plays a key role in the evaluation of different clustering solutions of gene expression profiles. In this empirical study we compa...
Ido Priness, Oded Maimon, Irad E. Ben-Gal
BMCBI
2006
129views more  BMCBI 2006»
14 years 9 months ago
A literature-based similarity metric for biological processes
Background: Recent analyses in systems biology pursue the discovery of functional modules within the cell. Recognition of such modules requires the integrative analysis of genome-...
Monica Chagoyen, Pedro Carmona-Saez, Concha Gil, J...
EDBTW
2010
Springer
15 years 4 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
MICRO
2009
IEEE
124views Hardware» more  MICRO 2009»
15 years 4 months ago
ZerehCache: armoring cache architectures in high defect density technologies
Aggressive technology scaling to 45nm and below introduces serious reliability challenges to the design of microprocessors. Large SRAM structures used for caches are particularly ...
Amin Ansari, Shantanu Gupta, Shuguang Feng, Scott ...