Sciweavers

44 search results - page 9 / 9
» Reuse of Specification Patterns with the B Method
Sort
View
WORM
2004
13 years 6 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
ICMLA
2008
13 years 6 months ago
Tumor Targeting for Lung Cancer Radiotherapy Using Machine Learning Techniques
Accurate lung tumor targeting in real time plays a fundamental role in image-guide radiotherapy of lung cancers. Precise tumor targeting is required for both respiratory gating an...
Tong Lin, Laura Cervino, Xiaoli Tang, Nuno Vasconc...
BMCBI
2005
113views more  BMCBI 2005»
13 years 5 months ago
Pathway level analysis of gene expression using singular value decomposition
Background: A promising direction in the analysis of gene expression focuses on the changes in expression of specific predefined sets of genes that are known in advance to be rela...
John K. Tomfohr, Jun Lu, Thomas B. Kepler
PVLDB
2008
163views more  PVLDB 2008»
13 years 4 months ago
C-DEM: a multi-modal query system for Drosophila Embryo databases
The amount of biological data publicly available has experienced an exponential growth as the technology advances. Online databases are now playing an important role as informatio...
Fan Guo, Lei Li, Christos Faloutsos, Eric P. Xing