Sciweavers

143 search results - page 25 / 29
» Automated size analysis for OCL
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 5 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
DAC
2005
ACM
15 years 11 months ago
Fault and energy-aware communication mapping with guaranteed latency for applications implemented on NoC
As feature sizes shrink, transient failures of on-chip network links become a critical problem. At the same time, many applications require guarantees on both message arrival prob...
Sorin Manolache, Petru Eles, Zebo Peng
BMCBI
2008
100views more  BMCBI 2008»
14 years 10 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
EOR
2007
165views more  EOR 2007»
14 years 10 months ago
Adaptive credit scoring with kernel learning methods
Credit scoring is a method of modelling potential risk of credit applications. Traditionally, logistic regression, linear regression and discriminant analysis are the most popular...
Yingxu Yang
TITB
2010
138views Education» more  TITB 2010»
14 years 5 months ago
Local structure-based region-of-interest retrieval in brain MR images
The aging population and the growing amount of medical data have increased the need for automated tools in the neurology departments. Although the researchers have been developing ...
Devrim Unay, Ahmet Ekin, Radu S. Jasinschi