Sciweavers

285 search results - page 46 / 57
» A Matlab Toolbox Implementing Level Set Methods
Sort
View
109
Voted
ICDCS
2009
IEEE
14 years 9 months ago
Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing
In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective ...
Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang
BMCBI
2007
179views more  BMCBI 2007»
14 years 11 months ago
rMotifGen: random motif generator for DNA and protein sequences
Background: Detection of short, subtle conserved motif regions within a set of related DNA or amino acid sequences can lead to discoveries about important regulatory domains such ...
Eric C. Rouchka, C. Timothy Hardin
ICSE
2008
IEEE-ACM
15 years 11 months ago
A value-based approach for documenting design decisions rationale: a replicated experiment
The explicit documentation of the rationale of design decisions is a practice generally encouraged but rarely implemented in industry because of a variety of inhibitors. Known met...
Davide Falessi, Rafael Capilla, Giovanni Cantone
ICPR
2008
IEEE
15 years 6 months ago
Fuzzy maximum scatter discriminant analysis and its application to face recognition
In this paper, a reformative scatter difference discriminant criterion (SDDC) with fuzzy set theory is studied. The scatter difference between between-class and within-class as di...
Jianguo Wang, Wankou Yang, Jingyu Yang
107
Voted
ACSAC
2005
IEEE
15 years 5 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...