Sciweavers

2047 search results - page 376 / 410
» Pervasive Computing on Active Networks
Sort
View
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 6 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a ...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
POLICY
2007
Springer
15 years 6 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Selective Channel Feedback Mechanisms for Wireless Multichannel Scheduling
Opportunistic scheduling can significantly improve wireless network performance by exploiting the feedback information that conveys the underlying channel condition. In emerging ...
Young-June Choi, Saewoong Bahk
ISPDC
2005
IEEE
15 years 5 months ago
Adaptive window scheduling for a hierarchical agent system
DIET (Distributed Interactive Engineering Toolbox) is a toolbox for the construction of Network Enabled Server (NES) systems. For most NES systems, as for most grid middleware sys...
Holly Dail, Frederic Desprez