Sciweavers

809 search results - page 162 / 162
» Requirements by Contracts allow Automated System Testing
Sort
View
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 5 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
FGCS
2007
142views more  FGCS 2007»
13 years 5 months ago
Fault tolerant high performance Information Services for dynamic collections of Grid and Web services
Abstract. E-Science Semantic Grids can often be thought of as dynamic collection of semantic subgrids where each subgrid is a collection of modest number of services that assembled...
Mehmet S. Aktas, Geoffrey Fox, Marlon E. Pierce
TASLP
2010
107views more  TASLP 2010»
13 years 2 days ago
A Robust Method to Extract Talker Azimuth Orientation Using a Large-Aperture Microphone Array
Knowing the orientation of a talker in the focal area of a large-aperture microphone array enables the development of better beamforming algorithms (to obtain higher-quality speech...
Avram Levi, Harvey F. Silverman
BMCBI
2011
12 years 9 months ago
Fusion of metabolomics and proteomics data for biomarkers discovery: case study on the experimental autoimmune encephalomyelitis
Background: Analysis of Cerebrospinal Fluid (CSF) samples holds great promise to diagnose neurological pathologies and gain insight into the molecular background of these patholog...
Lionel Blanchet, Agnieszka Smolinska, Amos Attali,...