Sciweavers

2248 search results - page 320 / 450
» Using Bayesian networks to analyze expression data
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 5 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
SAS
2001
Springer
15 years 8 months ago
Solving Regular Tree Grammar Based Constraints
This paper describes the precise speci cation, design, analysis, implementation, and measurements of an e cient algorithm for solving regular tree grammar based constraints. The p...
Yanhong A. Liu, Ning Li, Scott D. Stoller
BIOINFORMATICS
2006
118views more  BIOINFORMATICS 2006»
15 years 4 months ago
A probabilistic dynamical model for quantitative inference of the regulatory mechanism of transcription
Motivation Quantitative estimation of the regulatory relationship between transcription factors and genes is a fundamental stepping stone when trying to develop models of cellular...
Guido Sanguinetti, Magnus Rattray, Neil D. Lawrenc...
B
2007
Springer
15 years 8 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet