Sciweavers

1414 search results - page 220 / 283
» Combining Intruder Theories
Sort
View
IJCBDD
2010
127views more  IJCBDD 2010»
14 years 8 months ago
Predicting protein complexes by data integration of different types of interactions
: The explosion of highthroughput interaction data from proteomics studies gives us the opportunity to integrate Protein-Protein Interactions (PPI) from different type of interacti...
Powell Patrick Cheng Tan, Daryanaz Dargahi, Freder...
INFOCOM
2010
IEEE
14 years 8 months ago
Design and Analysis of a Robust Pipelined Memory System
Abstract—Many network processing applications require wirespeed access to large data structures or a large amount of flowlevel data, but the capacity of SRAMs is woefully inadeq...
Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun Xu
ISOLA
2010
Springer
14 years 8 months ago
Ten Years of Performance Evaluation for Concurrent Systems Using CADP
This article comprehensively surveys the work accomplished during the past decade on an approach to analyze concurrent systems qualitatively and quantitatively, by combining functi...
Nicolas Coste, Hubert Garavel, Holger Hermanns, Fr...
PAMI
2010
174views more  PAMI 2010»
14 years 8 months ago
Image Segmentation with a Unified Graphical Model
—We propose a unified graphical model that can represent both the causal and noncausal relationships among random variables and apply it to the image segmentation problem. Specif...
Lei Zhang 0011, Qiang Ji
PSYCHNOLOGY
2010
116views more  PSYCHNOLOGY 2010»
14 years 8 months ago
Social and Spatial Presence: An Application to Optimize Human-Computer Interaction
This study provides a framework for researchers who study human-computer interaction to develop and evaluate user-centric user-interfaces by applying existing theories about telep...
Karl Horvath, Matthew Lombard