Sciweavers

102 search results - page 19 / 21
» Tools and Architecture for the Evaluation of Similarity Meas...
Sort
View
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
12 years 11 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
SOFSEM
2000
Springer
13 years 8 months ago
Exhaustive Search, Combinatorial Optimization and Enumeration: Exploring the Potential of Raw Computing Power
For half a century since computers came into existence, the goal of finding elegant and efficient algorithms to solve "simple" (welldefined and well-structured) problems ...
Jürg Nievergelt
BMCBI
2006
126views more  BMCBI 2006»
13 years 5 months ago
Effect of data normalization on fuzzy clustering of DNA microarray data
Background: Microarray technology has made it possible to simultaneously measure the expression levels of large numbers of genes in a short time. Gene expression data is informati...
Seo Young Kim, Jae Won Lee, Jong Sung Bae
TMC
2008
210views more  TMC 2008»
13 years 4 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
IMC
2010
ACM
13 years 2 months ago
Resolving IP aliases with prespecified timestamps
Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP address...
Justine Sherry, Ethan Katz-Bassett, Mary Pimenova,...