Sciweavers

6087 search results - page 1128 / 1218
» Knowledge discovery methods
Sort
View
PTS
2007
120views Hardware» more  PTS 2007»
15 years 5 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
RSS
2007
135views Robotics» more  RSS 2007»
15 years 5 months ago
Learning omnidirectional path following using dimensionality reduction
Abstract— We consider the task of omnidirectional path following for a quadruped robot: moving a four-legged robot along any arbitrary path while turning in any arbitrary manner....
J. Zico Kolter, Andrew Y. Ng
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 5 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
APBC
2004
125views Bioinformatics» more  APBC 2004»
15 years 5 months ago
A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction
Protein structure prediction is considered to be the holy grail of bioinformatics. Ab initio and homology modelling are two important groups of methods used in protein structure p...
Saravanan Dayalan, Savitri Bevinakoppa, Heiko Schr...
200
Voted
APBC
2004
173views Bioinformatics» more  APBC 2004»
15 years 5 months ago
RNA Secondary Structure Prediction with Simple Pseudoknots
Pseudoknots are widely occurring structural motifs in RNA. Pseudoknots have been shown to be functionally important in different RNAs which play regulatory, catalytic, or structur...
Jitender S. Deogun, Ruben Donts, Olga Komina, Fang...
« Prev « First page 1128 / 1218 Last » Next »