Sciweavers

175 search results - page 34 / 35
» Data-based identifiability analysis of non-linear dynamical ...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
BMCBI
2005
124views more  BMCBI 2005»
14 years 9 months ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
SIAMADS
2010
121views more  SIAMADS 2010»
14 years 4 months ago
Binocular Rivalry in a Competitive Neural Network with Synaptic Depression
We study binocular rivalry in a competitive neural network with synaptic depression. In particular, we consider two coupled hypercolums within primary visual cortex (V1), represent...
Zachary P. Kilpatrick, Paul C. Bressloff
ASPLOS
2009
ACM
15 years 10 months ago
RapidMRC: approximating L2 miss rate curves on commodity systems for online optimizations
Miss rate curves (MRCs) are useful in a number of contexts. In our research, online L2 cache MRCs enable us to dynamically identify optimal cache sizes when cache-partitioning a s...
David K. Tam, Reza Azimi, Livio Soares, Michael St...
AAAI
2010
14 years 11 months ago
Multi-Agent Plan Recognition: Formalization and Algorithms
Multi-Agent Plan Recognition (MAPR) seeks to identify the dynamic team structures and team behaviors from the observations of the activity-sequences of a set of intelligent agents...
Bikramjit Banerjee, Landon Kraemer, Jeremy Lyle