Sciweavers

16216 search results - page 3212 / 3244
» Effective Modeling with Constraints
Sort
View
CN
2006
104views more  CN 2006»
14 years 11 months ago
Slot allocation schemes for delay sensitive traffic support in asynchronous wireless mesh networks
Heterogeneous multihop wireless networks such as wireless mesh networks consist of a set of resource-constrained mobile nodes that want to communicate with each other and a set of...
V. Vidhyashankar, B. S. Manoj, C. Siva Ram Murthy
IJAR
2008
118views more  IJAR 2008»
14 years 11 months ago
Dynamic multiagent probabilistic inference
Cooperative multiagent probabilistic inference can be applied in areas such as building surveillance and complex system diagnosis to reason about the states of the distributed unc...
Xiangdong An, Yang Xiang, Nick Cercone
BMCBI
2007
136views more  BMCBI 2007»
14 years 11 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
BMCBI
2007
149views more  BMCBI 2007»
14 years 11 months ago
Robust imputation method for missing values in microarray data
Background: When analyzing microarray gene expression data, missing values are often encountered. Most multivariate statistical methods proposed for microarray data analysis canno...
Dankyu Yoon, Eun-Kyung Lee, Taesung Park
ISF
2008
114views more  ISF 2008»
14 years 11 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 3212 / 3244 Last » Next »