Sciweavers

2522 search results - page 410 / 505
» Tools for Heterogeneous Network Computing
Sort
View
CHI
2007
ACM
15 years 7 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CONEXT
2007
ACM
15 years 7 months ago
Internet routing resilience to failures: analysis and implications
Internet interdomain routing is policy-driven, and thus physical connectivity does not imply reachability. On average, routing on today's Internet works quite well, ensuring ...
Jian Wu, Ying Zhang, Zhuoqing Morley Mao, Kang G. ...
NSDI
2007
15 years 5 months ago
A Location-Based Management System for Enterprise Wireless LANs
: The physical locations of clients and access points in a wireless LAN may have a large impact on network performance. However, today’s WLAN management tools do not provide info...
Ranveer Chandra, Jitendra Padhye, Alec Wolman, Bri...
CIBCB
2005
IEEE
15 years 5 months ago
Neuro-fuzzy Prediction of Biological Activity and Rule Extraction for HIV-1 Protease Inhibitors
— A fuzzy neural network (FNN) and multiple linear regression (MLR) were used to predict biological activities of 26 newly designed HIV-1 protease potential inhibitory compounds....
Razvan Andonie, Levente Fabry-Asztalos, Catharine ...
RAID
2010
Springer
15 years 1 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin