Sciweavers

868 search results - page 103 / 174
» Using concept analysis to detect co-change patterns
Sort
View
128
Voted
RAID
1999
Springer
15 years 8 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
ALMOB
2007
170views more  ALMOB 2007»
15 years 3 months ago
A spatio-temporal mining approach towards summarizing and analyzing protein folding trajectories
Understanding the protein folding mechanism remains a grand challenge in structural biology. In the past several years, computational theories in molecular dynamics have been empl...
Hui Yang, Srinivasan Parthasarathy, Duygu Ucar
132
Voted
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
119
Voted
CAIP
2007
Springer
190views Image Analysis» more  CAIP 2007»
15 years 10 months ago
Image Segmentation Based on Height Maps
Abstract. In this paper we introduce a new method for image segmentation. It is based on a height map generated from the input image. The height map characterizes the image content...
Gabriele Peters, Jochen Kerdels
BMCBI
2011
14 years 10 months ago
The PathOlogist: An Automated Tool for Pathway-Centric Analysis
Background: The PathOlogist is a new tool designed to transform large sets of gene expression data into quantitative descriptors of pathway-level behavior. The tool aims to provid...
Sharon I. Greenblum, Sol Efroni, Carl F. Schaefer,...