Sciweavers

2715 search results - page 251 / 543
» Network bucket testing
Sort
View
BIOINFORMATICS
2008
172views more  BIOINFORMATICS 2008»
15 years 26 days ago
Fitting a geometric graph to a protein-protein interaction network
Motivation: Finding a good network null model for protein-protein interaction (PPI) networks is a fundamental issue. Such a model would provide insights into the interplay between...
Desmond J. Higham, Marija Rasajski, Natasa Przulj
95
Voted
BMCBI
2010
96views more  BMCBI 2010»
15 years 26 days ago
A statistical framework for differential network analysis from microarray data
Background: It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of gene...
Ryan Gill, Somnath Datta, Susmita Datta
151
Voted
SECPERU
2006
IEEE
15 years 6 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
127
Voted
FSR
2003
Springer
251views Robotics» more  FSR 2003»
15 years 6 months ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...
96
Voted
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 2 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...