Sciweavers

29079 search results - page 5770 / 5816
» Design Of Future Systems
Sort
View
BMCBI
2008
116views more  BMCBI 2008»
14 years 10 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...
BMCBI
2008
79views more  BMCBI 2008»
14 years 10 months ago
In silico docking of urokinase plasminogen activator and integrins
Background: Urokinase, its receptor and the integrins are functionally associated and involved in regulation of cell signaling, migration, adhesion and proliferation. No structura...
Bernard Degryse, Juan Fernández-Recio, Vale...
CN
2008
100views more  CN 2008»
14 years 10 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CN
2008
127views more  CN 2008»
14 years 10 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
COMCOM
2008
145views more  COMCOM 2008»
14 years 10 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
« Prev « First page 5770 / 5816 Last » Next »