Sciweavers

13489 search results - page 2673 / 2698
» Operating System
Sort
View
108
Voted
CGF
2006
191views more  CGF 2006»
14 years 11 months ago
A Robust Two-Step Procedure for Quad-Dominant Remeshing
We propose a new technique for quad-dominant remeshing which separates the local regularity requirements from the global alignment requirements by working in two steps. In the fir...
Martin Marinov, Leif Kobbelt
110
Voted
CORR
2006
Springer
108views Education» more  CORR 2006»
14 years 11 months ago
Two polygraphic presentations of Petri nets
: This document gives an algebraic and two polygraphic translations of Petri nets, all three providing an easier way to describe reductions and to identify some of them. The first ...
Yves Guiraud
118
Voted
BMCBI
2007
159views more  BMCBI 2007»
14 years 11 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...
BMCBI
2007
136views more  BMCBI 2007»
14 years 11 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
IJNSEC
2008
201views more  IJNSEC 2008»
14 years 11 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
« Prev « First page 2673 / 2698 Last » Next »