Sciweavers

2131 search results - page 73 / 427
» Immunity for Closed Sets
Sort
View
112
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 7 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
88
Voted
BMCBI
2010
110views more  BMCBI 2010»
15 years 27 days ago
MultiRTA: A simple yet reliable method for predicting peptide binding affinities for multiple class II MHC allotypes
Background: The binding of peptide fragments of antigens to class II MHC is a crucial step in initiating a helper T cell immune response. The identification of such peptide epitop...
Andrew J. Bordner, Hans D. Mittelmann
116
Voted
JEI
2000
134views more  JEI 2000»
15 years 17 days ago
Pattern matching using the blur hit - miss transform
The usefulness of the hit-miss transform (HMT) and related transforms for pattern matching in document image applications is examined. Although the HMT is sensitive to the types o...
Dan S. Bloomberg, Luc Vincent
96
Voted
LPNMR
2005
Springer
15 years 6 months ago
The nomore++ System
Abstract. We present a new answer set solver nomore++. Distinguishing features include its treatment of heads and bodies equitably as computational objects and a new hybrid lookahe...
Christian Anger, Martin Gebser, Thomas Linke, Andr...
100
Voted
JSYML
2007
97views more  JSYML 2007»
15 years 20 days ago
Sublocales in formal topology
The paper studies how the localic notion of sublocale transfers to formal topology. For any formal topology (not necessarily with positivity predicate) we define a sublocale to b...
Steven Vickers