Sciweavers

4270 search results - page 67 / 854
» A Permutation Approach to Validation
Sort
View
BMCBI
2007
99views more  BMCBI 2007»
15 years 4 months ago
Towards validating the hypothesis of phylogenetic profiling
Background: As the number of fully sequenced genome increases, the need is greater for bioinformatics to predict or annotate genes of a newly sequenced genome. Ever since Eisenber...
Raja Loganantharaj, Mazen Atwi
CASES
2010
ACM
15 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ISBI
2009
IEEE
15 years 11 months ago
Quantitative Validation of Optical Flow Based Myocardial Strain Measures Using Sonomicrometry
Dynamic cardiac metrics, including myocardial strains and displacements, provide a quantitative approach to evaluate cardiac function. However, in current clinical diagnosis, larg...
Qi Duan, Katherine Parker, Auranuch Lorsakul, Elsa...
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
15 years 10 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
IFIP
2005
Springer
15 years 9 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray