Sciweavers

259 search results - page 33 / 52
» Causal Discovery from Changes
Sort
View
101
Voted
ESEM
2009
ACM
15 years 4 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
BMCBI
2007
152views more  BMCBI 2007»
14 years 9 months ago
Difference-based clustering of short time-course microarray data with replicates
Background: There are some limitations associated with conventional clustering methods for short time-course gene expression data. The current algorithms require prior domain know...
Jihoon Kim, Ju Han Kim
99
Voted
FTCS
1997
115views more  FTCS 1997»
14 years 10 months ago
Robust Emulation of Shared Memory Using Dynamic Quorum-Acknowledged Broadcasts
This paper presents robust emulation of multi-writer/multi-reader registers in message-passing systems using dynamic quorum con gurations. In addition to processor and link failur...
Nancy A. Lynch, Alexander A. Shvartsman
ECAL
1999
Springer
15 years 1 months ago
How Symbiosis Can Guide Evolution
Hinton and Nowlan have demonstrated a model of how lifetime plasticity can guide evolution. They show how acquired traits change the shape of the reward landscape in which subseque...
Richard A. Watson, Jordan B. Pollack
ICIAP
2003
ACM
15 years 9 months ago
Content-based video summarization and adaptation for ubiquitous media access
Today's mobile and wireless users access multimedia content from different types of networks and terminals. Content analysis plays a critical role in developing effective sol...
Shih-Fu Chang