Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Background: To interpret microarray experiments, several ontological analysis tools have been developed. However, current tools are limited to specific organisms. Results: We deve...
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
The Selfish-brain theory has created the theoretical basis for the systemic analysis of the energy metabolism in terms of a supply chain. The energy in form of glucose equivalents...
Resource management constitutes an important infrastructural component of a computational grid environment. The aim of grid resource management is to efficiently schedule applicat...
Junwei Cao, Stephen A. Jarvis, Daniel P. Spooner, ...