Sciweavers

1486 search results - page 274 / 298
» Firewall Rules Analysis
Sort
View
BMCBI
2007
106views more  BMCBI 2007»
14 years 12 months ago
Constructing a meaningful evolutionary average at the phylogenetic center of mass
Background: As a consequence of the evolutionary process, data collected from related species tend to be similar. This similarity by descent can obscure subtler signals in the dat...
Eric A. Stone, Arend Sidow
BMCBI
2007
140views more  BMCBI 2007»
14 years 12 months ago
Investigations into the relationship between feedback loops and functional importance of a signal transduction network based on
Background: A number of studies on biological networks have been carried out to unravel the topological characteristics that can explain the functional importance of network nodes...
Yung-Keun Kwon, Sun Shim Choi, Kwang-Hyun Cho
BMCBI
2007
123views more  BMCBI 2007»
14 years 11 months ago
Robust clustering in high dimensional data using statistical depths
Background: Mean-based clustering algorithms such as bisecting k-means generally lack robustness. Although componentwise median is a more robust alternative, it can be a poor cent...
Yuanyuan Ding, Xin Dang, Hanxiang Peng, Dawn Wilki...
ENTCS
2007
97views more  ENTCS 2007»
14 years 11 months ago
Safety-Oriented Design of Component Assemblies using Safety Interfaces
This paper promotes compositional reasoning in the context of safety-critical systems, and demonstrates a safety-oriented component model using an application from the automotive ...
Jonas Elmqvist, Simin Nadjm-Tehrani
ENTCS
2007
168views more  ENTCS 2007»
14 years 11 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...