Sciweavers

188 search results - page 14 / 38
» Injectivity analysis using interval analysis: Application to...
Sort
View
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 4 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu
WWW
2006
ACM
15 years 10 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
67
Voted
HPDC
2008
IEEE
15 years 4 months ago
Key-based consistency and availability in structured overlay networks
Structured Overlay Networks provide a promising platform for high performance applications since they are scalable, fault-tolerant and self-managing. Structured overlays provide l...
Tallat M. Shafaat, Thorsten Schütt, Monika Mo...
DASFAA
2008
IEEE
190views Database» more  DASFAA 2008»
15 years 4 months ago
Analysis of Time Series Using Compact Model-Based Descriptions
Abstract. Recently, we have proposed a novel method for the compression of time series based on mathematical models that explore dependencies between different time series. This r...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
80
Voted
ACSAC
2007
IEEE
15 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...