Sciweavers

12131 search results - page 2335 / 2427
» Introduction to Modeling and Simulation
Sort
View
CIARP
2009
Springer
15 years 9 months ago
Analysis of the GRNs Inference by Using Tsallis Entropy and a Feature Selection Approach
Abstract. An important problem in the bioinformatics field is to understand how genes are regulated and interact through gene networks. This knowledge can be helpful for many appl...
Fabrício Martins Lopes, Evaldo A. de Olivei...
CLOUDCOM
2009
Springer
15 years 9 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
IVA
2009
Springer
15 years 9 months ago
Spontaneous Avatar Behavior for Human Territoriality
Abstract. The challenge of making a virtual world believable includes a requirement for AI entities which autonomously react to a dynamic environment. After the breakthroughs in be...
Claudio Pedica, Hannes Högni Vilhjálms...
139
Voted
LPNMR
2009
Springer
15 years 9 months ago
Application of ASP for Automatic Synthesis of Flexible Multiprocessor Systems from Parallel Programs
Configurable on chip multiprocessor systems combine advantages of task-level parallelism and the flexibility of field-programmable devices to customize architectures for paralle...
Harold Ishebabi, Philipp Mahr, Christophe Bobda, M...
SERSCISA
2009
Springer
15 years 9 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
« Prev « First page 2335 / 2427 Last » Next »