Sciweavers

4184 search results - page 52 / 837
» Names of Our Lives
Sort
View
SEFM
2005
IEEE
15 years 3 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
15 years 3 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 2 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
ASUNAM
2009
IEEE
15 years 1 months ago
Groupthink and Peer Pressure: Social Influence in Online Social Network Groups
In this paper, we present a horizontal view of social influence, more specifically a quantitative study of the influence of neighbours on the probability of a particular node to jo...
Pan Hui, Sonja Buchegger
CIBCB
2007
IEEE
15 years 1 months ago
Genetic Regulatory Network Modeling Using Network Component Analysis and Fuzzy Clustering
Gene regulatory network model is the most widely used mechanism to model and predict the behavior of living organisms. Network Component Analysis (NCA) as an emerging issue for unc...
Fatemeh Bakouie, Mohammad Hassan Moradi