Sciweavers

2421 search results - page 359 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2008
171views more  BMCBI 2008»
15 years 4 months ago
Fuzzy association rules for biological data analysis: A case study on yeast
Background: Last years' mapping of diverse genomes has generated huge amounts of biological data which are currently dispersed through many databases. Integration of the info...
Francisco J. Lopez, Armando Blanco, Fernando Garci...
AROBOTS
2011
14 years 11 months ago
Time-extended multi-robot coordination for domains with intra-path constraints
Abstract— Many applications require teams of robots to cooperatively execute complex tasks. Among these domains are those where successful coordination solutions must respect con...
Edward Gil Jones, M. Bernardine Dias, Anthony Sten...
KBSE
2007
IEEE
15 years 10 months ago
Exploring the neighborhood with dora to expedite software maintenance
Completing software maintenance and evolution tasks for today’s large, complex software systems can be difficult, often requiring considerable time to understand the system well...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker
BMCBI
2006
97views more  BMCBI 2006»
15 years 4 months ago
REEF: searching REgionally Enriched Features in genomes
Background: In Eukaryotic genomes, different features including genes are not uniformly distributed. The integration of annotation information and genomic position of functional D...
Alessandro Coppe, Gian Antonio Danieli, Stefania B...
CCS
2007
ACM
15 years 10 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...