Sciweavers

476 search results - page 89 / 96
» An analysis of a large scale habitat monitoring application
Sort
View
VIZSEC
2007
Springer
15 years 3 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 2 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
CIVR
2008
Springer
138views Image Analysis» more  CIVR 2008»
14 years 11 months ago
MyPlaces: detecting important settings in a visual diary
We describe a novel approach to identifying specific settings in large collections of passively captured images corresponding to a visual diary. An algorithm developed for setting...
Michael Blighe, Noel E. O'Connor
BMCBI
2007
148views more  BMCBI 2007»
14 years 9 months ago
Evaluation of gene-expression clustering via mutual information distance measure
Background: The definition of a distance measure plays a key role in the evaluation of different clustering solutions of gene expression profiles. In this empirical study we compa...
Ido Priness, Oded Maimon, Irad E. Ben-Gal
BMCBI
2010
89views more  BMCBI 2010»
14 years 9 months ago
Semi-automatic identification of punching areas for tissue microarray building: the tubular breast cancer pilot study
Background: Tissue MicroArray technology aims to perform immunohistochemical staining on hundreds of different tissue samples simultaneously. It allows faster analysis, considerab...
Federica Viti, Ivan Merelli, Mieke Timmermans, Mic...