Sciweavers

2391 search results - page 448 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 10 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CSDA
2008
128views more  CSDA 2008»
14 years 10 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
BMCBI
2006
78views more  BMCBI 2006»
14 years 9 months ago
Subfamily logos: visualization of sequence deviations at alignment positions with high information content
Background: Recognition of relevant sequence deviations can be valuable for elucidating functional differences between protein subfamilies. Interesting residues at highly conserve...
Eric Beitz
BMCBI
2006
132views more  BMCBI 2006»
14 years 9 months ago
Genome-wide DNA polymorphism analyses using VariScan
Background: DNA sequence polymorphisms analysis can provide valuable information on the evolutionary forces shaping nucleotide variation, and provides an insight into the function...
Stephan Hutter, Albert J. Vilella, Julio Rozas
CORR
2007
Springer
95views Education» more  CORR 2007»
14 years 9 months ago
Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments
In Grids scheduling decisions are often made on the basis of jobs being either data or computation intensive: in data intensive situations jobs may be pushed to the data and in co...
Richard McClatchey, Ashiq Anjum, Heinz Stockinger,...