Sciweavers

2740 search results - page 379 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
JSAC
2006
172views more  JSAC 2006»
15 years 3 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
109
Voted
PR
2006
84views more  PR 2006»
15 years 3 months ago
Clustering techniques for protein surfaces
Though most approaches to protein comparison are based on their structure, several studies produced evidence of a strict correlation between the surface characteristics of protein...
Lorenzo Baldacci, Matteo Golfarelli, Alessandra Lu...
134
Voted
TITB
2008
124views more  TITB 2008»
15 years 3 months ago
Miniature in vivo Robots for Remote and Harsh Environments
Abstract--Long-term human space exploration will require contingencies for emergency medical procedures including some capability to perform surgery. The ability to perform minimal...
Mark Rentschler, Stephen R. Platt, Kyle R. Berg, J...
AUTOMATICA
2002
126views more  AUTOMATICA 2002»
15 years 3 months ago
Halo orbit mission correction maneuvers using optimal control
This paper addresses the computation of the required trajectory correction maneuvers (TCM) for a halo orbit space mission to compensate for the launch velocity errors introduced b...
Radu Serban, Wang Sang Koon, Martin W. Lo, Jerrold...
CORR
2007
Springer
111views Education» more  CORR 2007»
15 years 3 months ago
A New Perspective on Multi-user Power Control Games in Interference Channels
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
Yi Su, Mihaela van der Schaar