Sciweavers

772 search results - page 131 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
BMCBI
2006
86views more  BMCBI 2006»
14 years 11 months ago
Identification of QTLs controlling gene expression networks defined a priori
Background: Gene expression microarrays allow the quantification of transcript accumulation for many or all genes in a genome. This technology has been utilized for a range of inv...
Daniel J. Kliebenstein, Marilyn A. L. West, Hans v...
ANCS
2005
ACM
15 years 5 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood
MOBICOM
2005
ACM
15 years 5 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
WWW
2009
ACM
16 years 12 days ago
Analysis of community structure in Wikipedia
We present the results of a community detection analysis of the Wikipedia graph. Distinct communities in Wikipedia contain semantically closely related articles. The central topic...
Dmitry Lizorkin, Olena Medelyan, Maria P. Grineva
KAIS
2011
129views more  KAIS 2011»
14 years 6 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis