Sciweavers

702 search results - page 131 / 141
» Identifying Graph Automorphisms Using Determining Sets
Sort
View
BMCBI
2008
132views more  BMCBI 2008»
14 years 11 months ago
Mixture models for analysis of melting temperature data
Background: In addition to their use in detecting undesired real-time PCR products, melting temperatures are useful for detecting variations in the desired target sequences. Metho...
Christoffer Nellåker, Fredrik Uhrzander, Joa...
CCS
2011
ACM
13 years 11 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 1 days ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
ECIR
2009
Springer
15 years 8 months ago
Joint Ranking for Multilingual Web Search
Ranking for multilingual information retrieval (MLIR) is a task to rank documents of different languages solely based on their relevancy to the query regardless of query’s langu...
Wei Gao, Cheng Niu, Ming Zhou, Kam-Fai Wong
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 4 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich