Sciweavers

5799 search results - page 1112 / 1160
» Patterns Generate Architectures
Sort
View
140
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 7 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
NAR
2010
123views more  NAR 2010»
14 years 7 months ago
Xenbase: gene expression and improved integration
Xenbase (www.xenbase.org), the model organism database for Xenopus laevis and X. (Silurana) tropicalis, is the principal centralized resource of genomic, development data and comm...
Jeff B. Bowes, Kevin A. Snyder, Erik Segerdell, Ch...
131
Voted
NAR
2010
202views more  NAR 2010»
14 years 7 months ago
dbDEPC: a database of Differentially Expressed Proteins in human Cancers
Cancer-related investigations have long been in the limelight of biomedical research. Years of effort from scientists and doctors worldwide have generated large amounts of data at...
Hong Li, Ying He, Guohui Ding, Chuan Wang, Lu Xie,...
SIAMADS
2010
100views more  SIAMADS 2010»
14 years 7 months ago
Optimal Intrinsic Dynamics for Bursting in a Three-Cell Network
Previous numerical and analytical work has shown that synaptic coupling can allow a network of model neurons to synchronize despite heterogeneity in intrinsic parameter values. In ...
Justin R. Dunmyre, Jonathan E. Rubin
TOG
2010
96views more  TOG 2010»
14 years 7 months ago
Light reallocation for high contrast projection using an analog micromirror array
We demonstrate for the first time a proof of concept projector with a secondary array of individually controllable, analog micromirrors added to improve the contrast and peak brig...
Reynald Hoskinson, Boris Stoeber, Wolfgang Heidric...
« Prev « First page 1112 / 1160 Last » Next »