Sciweavers

885 search results - page 148 / 177
» Process Patterns for COTS-Based Development
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
15 years 2 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
120
Voted
JNW
2008
167views more  JNW 2008»
15 years 2 months ago
Analyzing the ENRON Communication Network Using Agent-Based Simulation
Agent-based modeling, simulation, and network analysis approaches are one of the emergent techniques among soft computing literature. This paper presents an agent-based model for a...
Shinako Matsuyama, Takao Terano
JSAC
2006
165views more  JSAC 2006»
15 years 2 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
FGCS
2007
87views more  FGCS 2007»
15 years 2 months ago
FAIL-FCI: Versatile fault injection
One of the topics of paramount importance in the development of Grid middleware is the impact of faults, since their probability of occurrence in a Grid infrastructure and in larg...
William Hoarau, Sébastien Tixeuil, Fabien V...
JSW
2007
185views more  JSW 2007»
15 years 2 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...