Sciweavers

2210 search results - page 442 / 442
» Information complexity of neural networks
Sort
View
CN
1999
128views more  CN 1999»
13 years 5 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
JUCS
2010
160views more  JUCS 2010»
13 years 3 months ago
LCP-Nets: A Linguistic Approach for Non-functional Preferences in a Semantic SOA Environment
Abstract: This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-f...
Pierre Châtel, Isis Truck, Jacques Malenfant
BMCBI
2010
189views more  BMCBI 2010»
13 years 3 months ago
solQTL: a tool for QTL analysis, visualization and linking to genomes at SGN database
Background: A common approach to understanding the genetic basis of complex traits is through identification of associated quantitative trait loci (QTL). Fine mapping QTLs require...
Isaak Y. Tecle, Naama Menda, Robert M. Buels, Esth...
NAR
2011
357views Computer Vision» more  NAR 2011»
13 years 9 days ago
miRGator v2.0 : an integrated system for functional investigation of microRNAs
miRGator is an integrated database of microRNA (miRNA)-associated gene expression, target prediction, disease association and genomic annotation, which aims to facilitate function...
Sooyoung Cho, Yukyung Jun, Sanghyun Lee, Hyung-Seo...
PODC
2009
ACM
14 years 5 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan