Sciweavers

7544 search results - page 1276 / 1509
» Network Forensics Analysis
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 9 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AUTOMATICA
2011
14 years 9 months ago
Fast computation of minimal elementary decompositions of metabolic flux vectors
The concept of elementary flux vector is valuable in a number of applications of metabolic engineering. For instance, in metabolic flux analysis, each admissible flux vector ca...
Raphaël M. Jungers, Francisca Zamorano, Vince...
JASIS
2011
110views more  JASIS 2011»
14 years 8 months ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
JGO
2011
89views more  JGO 2011»
14 years 8 months ago
Model building using bi-level optimization
Abstract In many problems from different disciplines such as engineering, physics, medicine, and biology, a series of experimental data is used in order to generate a model that ca...
Georges K. Saharidis, Ioannis P. Androulakis, Mari...
NAR
2011
235views Computer Vision» more  NAR 2011»
14 years 8 months ago
P2CS: a database of prokaryotic two-component systems
P2CS (http://www.p2cs.org) is a specialized database for prokaryotic two-component systems (TCSs), virtually ubiquitous signalling proteins which regulate a wide range of physiolo...
Mohamed Barakat, Philippe Ortet, David E. Whitwort...
« Prev « First page 1276 / 1509 Last » Next »