Sciweavers

652 search results - page 120 / 131
» Deriving Specifications of Dependable Systems: toward a Meth...
Sort
View
BMCBI
2010
122views more  BMCBI 2010»
14 years 10 months ago
An automated framework for understanding structural variations in the binding grooves of MHC class II molecules
Background: MHC/HLA class II molecules are important components of the immune system and play a critical role in processes such as phagocytosis. Understanding peptide recognition ...
Kalidas Yeturu, Tapani Utriainen, Graham J. L. Kem...
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ATAL
2008
Springer
14 years 12 months ago
Approximating power indices
Many multiagent domains where cooperation among agents is crucial to achieving a common goal can be modeled as coalitional games. However, in many of these domains, agents are une...
Yoram Bachrach, Evangelos Markakis, Ariel D. Proca...
TSP
2008
118views more  TSP 2008»
14 years 9 months ago
Analytical Rate-Distortion-Complexity Modeling of Wavelet-Based Video Coders
Analytical modeling of the performance of video coders is essential in a variety of applications, such as power-constrained processing, complexity-driven video streaming, etc., whe...
Brian Foo, Yiannis Andreopoulos, Mihaela van der S...
BMCBI
2007
108views more  BMCBI 2007»
14 years 10 months ago
Computer-aided identification of polymorphism sets diagnostic for groups of bacterial and viral genetic variants
Background: Single nucleotide polymorphisms (SNPs) and genes that exhibit presence/absence variation have provided informative marker sets for bacterial and viral genotyping. Iden...
Erin P. Price, John Inman-Bamber, Venugopal Thiruv...