Sciweavers

450 search results - page 36 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
TCBB
2010
163views more  TCBB 2010»
14 years 4 months ago
Classification of Protein-Protein Interaction Full-Text Documents Using Text and Citation Network Features
Abstract--We participated (as Team 9) in the Article Classification Task of the Biocreative II.5 Challenge: binary classification of fulltext documents relevant for protein-protein...
Artemy Kolchinsky, Alaa Abi-Haidar, Jasleen Kaur, ...
SIGITE
2006
ACM
15 years 3 months ago
Does a virtual networking laboratory result in similar student achievement and satisfaction?
Delivery of content in networking and system administration curricula involves significant hands-on laboratory experience supplementing traditional classroom instruction at the Ro...
Edith A. Lawson, William Stackpole
WIOPT
2005
IEEE
15 years 3 months ago
Modular Analytical Performance Models for Ad Hoc Wireless Networks
Wireless ad hoc networks raised a series of challenging research tracks. In order to analyze and validate research results achieved, thorough performance evaluation efforts are ne...
Fernando Luís Dotti, Paulo Fernandes, Afons...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
TASLP
2008
149views more  TASLP 2008»
14 years 9 months ago
Music Retrieval Over Wireless Ad-Hoc Networks
Wireless networks introduce brand new opportunities for music delivery. The trend of using mobile devices in wireless networks, can significantly extent the recent change of paradi...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...