Sciweavers

2503 search results - page 364 / 501
» Building Computer Network Attacks
Sort
View
IJBRA
2006
59views more  IJBRA 2006»
15 years 1 months ago
Predicting altered pathways using extendable scaffolds
: Many diseases, especially solid tumors, involve the disruption or deregulation of cellular processes. Most current work using gene expression and other high-throughput data, simp...
B. M. Broom, T. J. McDonnell, D. Subramanian
121
Voted
COMPSYSTECH
2009
14 years 11 months ago
Architectural models for realization of web-based personal health systems
: Recent advances in Information and Communication Technologies (ICT) and more specifically in wireless networks and mobile computing have driven new directions in the development ...
Mitko Shopov, Grisha Spasov, Galidia Petrova
106
Voted
ICDCS
2008
IEEE
15 years 8 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu
PPSN
2004
Springer
15 years 7 months ago
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person’s...
Jingpeng Li, Uwe Aickelin
SIGCOMM
2009
ACM
15 years 8 months ago
VL2: a scalable and flexible data center network
To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to...
Albert G. Greenberg, James R. Hamilton, Navendu Ja...