Sciweavers

2349 search results - page 447 / 470
» Performing time-sensitive network experiments
Sort
View
70
Voted
BMCBI
2010
150views more  BMCBI 2010»
14 years 9 months ago
AMS 3.0: prediction of post-translational modifications
Background: We present here the recent update of AMS algorithm for identification of post-translational modification (PTM) sites in proteins based only on sequence information, us...
Subhadip Basu, Dariusz Plewczynski
BMCBI
2008
160views more  BMCBI 2008»
14 years 9 months ago
Feature selection environment for genomic applications
Background: Feature selection is a pattern recognition approach to choose important variables according to some criteria in order to distinguish or explain certain phenomena (i.e....
Fabrício Martins Lopes, David Correa Martin...
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
TNN
2008
178views more  TNN 2008»
14 years 9 months ago
IMORL: Incremental Multiple-Object Recognition and Localization
This paper proposes an incremental multiple-object recognition and localization (IMORL) method. The objective of IMORL is to adaptively learn multiple interesting objects in an ima...
Haibo He, Sheng Chen
94
Voted
JSAC
2007
153views more  JSAC 2007»
14 years 9 months ago
Cooperative Relay Service in a Wireless LAN
As a family of wireless local area network (WLAN) protocols between physical layer and higher layer protocols, IEEE 802.11 has to accommodate the features and requirements of both...
Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Song...