Sciweavers

10106 search results - page 2000 / 2022
» Algorithm Selection and Scheduling
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 12 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CORR
2010
Springer
174views Education» more  CORR 2010»
14 years 12 months ago
Collaborative Spectrum Sensing from Sparse Observations in Cognitive Radio Networks
Spectrum sensing, which aims at detecting spectrum holes, is the precondition for the implementation of cognitive radio. Collaborative spectrum sensing among the cognitive radio n...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
CSDA
2008
128views more  CSDA 2008»
14 years 12 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
BMCBI
2006
175views more  BMCBI 2006»
14 years 11 months ago
Parameter estimation for stiff equations of biosystems using radial basis function networks
Background: The modeling of dynamic systems requires estimating kinetic parameters from experimentally measured time-courses. Conventional global optimization methods used for par...
Yoshiya Matsubara, Shinichi Kikuchi, Masahiro Sugi...
BMCBI
2006
152views more  BMCBI 2006»
14 years 11 months ago
Amplification of the Gene Ontology annotation of Affymetrix probe sets
Background: The annotations of Affymetrix DNA microarray probe sets with Gene Ontology terms are carefully selected for correctness. This results in very accurate but incomplete a...
Enrique M. Muro, Carolina Perez-Iratxeta, Miguel A...
« Prev « First page 2000 / 2022 Last » Next »