Sciweavers

2131 search results - page 60 / 427
» Immunity for Closed Sets
Sort
View
76
Voted
BIOINFORMATICS
2007
66views more  BIOINFORMATICS 2007»
15 years 26 days ago
Gene expression network analysis and applications to immunology
We address the problem of using expression data and prior biological knowledge to identify differentially expressed pathways or groups of genes. Following an idea of Ideker et al...
Serban Nacu, Rebecca Critchley-Thorne, Peter Lee, ...
JCS
2007
84views more  JCS 2007»
15 years 20 days ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
109
Voted
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
14 years 7 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
CSMR
2010
IEEE
14 years 7 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
242
Voted
CVPR
2005
IEEE
2143views Computer Vision» more  CVPR 2005»
16 years 9 months ago
Level Set Evolution Without Re-initialization: A New Variational Formulation
"In this paper, we present a new variational formulation for geometric active contours that forces the level set function to be close to a signed distance function, and theref...
Chunming Li, Chenyang Xu, Changfeng Gui, and Marti...