Sciweavers

1610 search results - page 137 / 322
» Identity Based Multisignatures
Sort
View
IDEAL
2007
Springer
15 years 9 months ago
Analysis of Tiling Microarray Data by Learning Vector Quantization and Relevance Learning
We apply learning vector quantization to the analysis of tiling microarray data. As an example we consider the classification of C. elegans genomic probes as intronic or exonic. T...
Michael Biehl, Rainer Breitling, Yang Li
GMP
2006
IEEE
102views Solid Modeling» more  GMP 2006»
15 years 9 months ago
Representing Topological Structures Using Cell-Chains
Abstract. A new topological representation of surfaces in higher dimensions, “cell-chains” is developed. The representation is a generalization of Brisson’s cell-tuple data s...
David E. Cardoze, Gary L. Miller, Todd Phillips
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 8 months ago
Incorporating Active Rules Processing into Update Execution in XML Database Systems
We address the problem of efficient support for active rules in XML database systems. We describe a general form of active rules for XML based on XQuery and a previously defined...
Maria Rekouts
ICPADS
2005
IEEE
15 years 8 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
PAM
2005
Springer
15 years 8 months ago
Practical Passive Lossy Link Inference
We propose a practical technique for the identification of lossy network links from end-to-end measurements. Our scheme is based on a function that computes the likelihood of each...
Alexandros Batsakis, Tanu Malik, Andreas Terzis