Sciweavers

40 search results - page 8 / 8
» Transformation from OWL Description to Resource Space Model
Sort
View
IEEEARES
2006
IEEE
13 years 11 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ATAL
2005
Springer
13 years 10 months ago
Discovering strategic multi-agent behavior in a robotic soccer domain
2. THE MASM ALGORITHM An input to the MASM algorithm is a time-annotated multi-agent action sequence. The action sequence is then transformed into an action graph. An action graph ...
Andraz Bezek
BMCBI
2006
202views more  BMCBI 2006»
13 years 5 months ago
DWARF - a data warehouse system for analyzing protein families
Background: The emerging field of integrative bioinformatics provides the tools to organize and systematically analyze vast amounts of highly diverse biological data and thus allo...
Markus Fischer, Quan K. Thai, Melanie Grieb, J&uum...
TREC
2000
13 years 6 months ago
TREC-9 CLIR at CUHK: Disambiguation by Similarity Values Between Adjacent Words
We investigated the dictionary-based query translation method combining the translation disambiguation process using statistic cooccurrence information trained from the provided c...
Honglan Jin, Kam-Fai Wong
BMCBI
2004
101views more  BMCBI 2004»
13 years 5 months ago
A database for G proteins and their interaction with GPCRs
Background: G protein-coupled receptors (GPCRs) transduce signals from extracellular space into the cell, through their interaction with G proteins, which act as switches forming ...
Antigoni L. Elefsinioti, Pantelis G. Bagos, Ioanni...