Sciweavers

7941 search results - page 70 / 1589
» Network Analysis of Repositories
Sort
View
MSR
2009
ACM
15 years 6 months ago
A platform for software engineering research
Research in the fields of software quality, maintainability and evolution requires the analysis of large quantities of data, which often originate from open source software proje...
Georgios Gousios, Diomidis Spinellis
CCS
2007
ACM
15 years 6 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICMLA
2007
15 years 1 months ago
Learning bayesian networks consistent with the optimal branching
We introduce a polynomial-time algorithm to learn Bayesian networks whose structure is restricted to nodes with in-degree at most k and to edges consistent with the optimal branch...
Alexandra M. Carvalho, Arlindo L. Oliveira
JMLR
2010
185views more  JMLR 2010»
14 years 6 months ago
Efficient Heuristics for Discriminative Structure Learning of Bayesian Network Classifiers
We introduce a simple order-based greedy heuristic for learning discriminative structure within generative Bayesian network classifiers. We propose two methods for establishing an...
Franz Pernkopf, Jeff A. Bilmes
LISA
2004
15 years 1 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...