Sciweavers

2916 search results - page 529 / 584
» Generating Rule Sets from Model Trees
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
14 years 10 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
NAR
2007
90views more  NAR 2007»
14 years 9 months ago
The SUPERFAMILY database in 2007: families and functions
The SUPERFAMILY database provides protein domain assignments, at the SCOP ‘superfamily’ level, for the predicted protein sequences in over 400 completed genomes. A superfamily...
Derek Wilson, Martin Madera, Christine Vogel, Cyru...
SIAMJO
2010
84views more  SIAMJO 2010»
14 years 8 months ago
A Redistributed Proximal Bundle Method for Nonconvex Optimization
Proximal bundle methods have been shown to be highly successful optimization methods for unconstrained convex problems with discontinuous first derivatives. This naturally leads ...
Warren Hare, Claudia A. Sagastizábal
SPIRE
2010
Springer
14 years 7 months ago
Identifying SNPs without a Reference Genome by Comparing Raw Reads
Next generation sequencing (NGS) technologies are being applied to many fields of biology, notably to survey the polymorphism across individuals of a species. However, while single...
Pierre Peterlongo, Nicolas Schnel, Nadia Pisanti, ...
WWW
2011
ACM
14 years 5 months ago
Identifying enrichment candidates in textbooks
Many textbooks written in emerging countries lack clear and adequate coverage of important concepts. We propose a technological solution for algorithmically identifying those sect...
Rakesh Agrawal, Sreenivas Gollapudi, Anitha Kannan...