Sciweavers

1936 search results - page 383 / 388
» Network Analysis and Social Dynamics
Sort
View
RAID
2007
Springer
15 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
ISMB
2004
14 years 11 months ago
Predicting gene regulation by sigma factors in Bacillus subtilis from genome-wide data
Motivation: Sigma factors regulate the expression of genes in Bacillus subtilis at the transcriptional level. First we assess the ability of currently available gene regulatory ne...
Michiel J. L. de Hoon, Yuko Makita, Seiya Imoto, K...
TC
2011
14 years 4 months ago
Maximizing Spare Utilization by Virtually Reorganizing Faulty Cache Lines
—Aggressive technology scaling to 45nm and below introduces serious reliability challenges to the design of microprocessors. Since a large fraction of chip area is devoted to on-...
Amin Ansari, Shantanu Gupta, Shuguang Feng, Scott ...
ICDE
2007
IEEE
183views Database» more  ICDE 2007»
15 years 11 months ago
SpADe: On Shape-based Pattern Detection in Streaming Time Series
Monitoring predefined patterns in streaming time series is useful to applications such as trend-related analysis, sensor networks and video surveillance. Most current studies on s...
Yueguo Chen, Mario A. Nascimento, Beng Chin Ooi, A...
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
15 years 9 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...