Sciweavers

3299 search results - page 639 / 660
» A general mathematics of names
Sort
View
ENVSOFT
2006
72views more  ENVSOFT 2006»
14 years 11 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
BMCBI
2007
152views more  BMCBI 2007»
14 years 11 months ago
Recodon: Coalescent simulation of coding DNA sequences with recombination, migration and demography
Background: Coalescent simulations have proven very useful in many population genetics studies. In order to arrive to meaningful conclusions, it is important that these simulation...
Miguel Arenas, David Posada
BMCBI
2007
100views more  BMCBI 2007»
14 years 11 months ago
Discovering structural motifs using a structural alphabet: Application to magnesium-binding sites
Background: For many metalloproteins, sequence motifs characteristic of metal-binding sites have not been found or are so short that they would not be expected to be metal-specifi...
Minko Dudev, Carmay Lim
ISCI
2008
165views more  ISCI 2008»
14 years 11 months ago
Support vector regression from simulation data and few experimental samples
This paper considers nonlinear modeling based on a limited amount of experimental data and a simulator built from prior knowledge. The problem of how to best incorporate the data ...
Gérard Bloch, Fabien Lauer, Guillaume Colin...
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 11 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani