Sciweavers

561 search results - page 87 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
ASWSD
2006
Springer
15 years 5 months ago
Generating Sound and Resource-Aware Code from Hybrid Systems Models
Modern real-time embedded systems are complex, distributed, feature-rich applications. Model-based development of real-time embedded systems promises to simplify and accelerate the...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...
AAAI
2008
15 years 4 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
IIS
2004
15 years 3 months ago
Automatic Understanding of Signals
Using computers for different task including enhancement, description and evaluation of signals we typically include three steps: signal processing (for obtaining signal of better ...
Ryszard Tadeusiewicz
WSPI
2004
15 years 3 months ago
Logic, Neuroscience and Phenomenology in Cahoots?
Cognitive sciences, including cognitive neurosciences, have provided important insights into the notions of awareness, implicit/explicit information processing in knowledge, percep...
Ahti-Veikko Pietarinen
BMCBI
2008
163views more  BMCBI 2008»
15 years 2 months ago
ProfileGrids as a new visual representation of large multiple sequence alignments: a case study of the RecA protein family
Background: Multiple sequence alignments are a fundamental tool for the comparative analysis of proteins and nucleic acids. However, large data sets are no longer manageable for v...
Alberto I. Roca, Albert E. Almada, Aaron C. Abajia...