Sciweavers

1080 search results - page 48 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
HICSS
2010
IEEE
142views Biometrics» more  HICSS 2010»
15 years 6 months ago
DQ Tags and Decision-Making
It has been suggested that metadata describing data quality (DQ), termed DQ tags, be made available in situations where decision-makers are unfamiliar with the data context, for e...
Rosanne Price, Graeme G. Shanks
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 6 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
NDSS
2008
IEEE
15 years 6 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
CCS
2006
ACM
15 years 3 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
BMCBI
2006
150views more  BMCBI 2006»
14 years 12 months ago
Instance-based concept learning from multiclass DNA microarray data
Background: Various statistical and machine learning methods have been successfully applied to the classification of DNA microarray data. Simple instance-based classifiers such as...
Daniel P. Berrar, Ian Bradbury, Werner Dubitzky