Sciweavers

2801 search results - page 415 / 561
» On the Adequateness of the Connection Method
Sort
View
RAID
1999
Springer
15 years 2 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
ALMOB
2008
131views more  ALMOB 2008»
14 years 10 months ago
Fast algorithms for computing sequence distances by exhaustive substring composition
The increasing throughput of sequencing raises growing needs for methods of sequence analysis and comparison on a genomic scale, notably, in connection with phylogenetic tree reco...
Alberto Apostolico, Olgert Denas
BMCBI
2007
136views more  BMCBI 2007»
14 years 10 months ago
Reduced modeling of signal transduction - a modular approach
Background: Combinatorial complexity is a challenging problem in detailed and mechanistic mathematical modeling of signal transduction. This subject has been discussed intensively...
Markus Koschorreck, Holger Conzelmann, Sybille Ebe...
BMCBI
2007
176views more  BMCBI 2007»
14 years 10 months ago
Correlation-maximizing surrogate gene space for visual mining of gene expression patterns in developing barley endosperm tissue
Background: Micro- and macroarray technologies help acquire thousands of gene expression patterns covering important biological processes during plant ontogeny. Particularly, fait...
Marc Strickert, Nese Sreenivasulu, Björn Usad...
ENGL
2008
186views more  ENGL 2008»
14 years 10 months ago
High Performance Monte-Carlo Based Option Pricing on FPGAs
High performance computing is becoming increasingly important in the field of financial computing, as the complexity of financial models continues to increase. Many of these financ...
Xiang Tian, Khaled Benkrid, Xiaochen Gu