Sciweavers

1661 search results - page 169 / 333
» Real-time specification patterns
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 1 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
JPDC
2007
184views more  JPDC 2007»
15 years 1 months ago
Modeling of concurrent web sessions with bounded inconsistency in shared data
Client interactions with modern web-accessible network services are typically organized into sessions involving multiple requests that read and write shared application data. Ther...
Alexander Totok, Vijay Karamcheti
BMCBI
2002
188views more  BMCBI 2002»
15 years 1 months ago
The limit fold change model: A practical approach for selecting differentially expressed genes from microarray data
Background: The biomedical community is developing new methods of data analysis to more efficiently process the massive data sets produced by microarray experiments. Systematic an...
David M. Mutch, Alvin Berger, Robert Mansourian, A...
AIR
1998
160views more  AIR 1998»
15 years 1 months ago
Automatic Plankton Image Recognition
Plankton form the base of the food chain in the ocean and are fundamental to marine ecosystem dynamics. The rapid mapping of plankton abundance together with taxonomic and size com...
Xiaoou Tang, W. Kenneth Stewart, He Huang, Scott M...
SCP
1998
163views more  SCP 1998»
15 years 1 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat