Sciweavers

1336 search results - page 203 / 268
» SMTP Path Analysis
Sort
View
BMCBI
2005
158views more  BMCBI 2005»
14 years 11 months ago
Automated generation of heuristics for biological sequence comparison
Background: Exhaustive methods of sequence alignment are accurate but slow, whereas heuristic approaches run quickly, but their complexity makes them more difficult to implement. ...
Guy St. C. Slater, Ewan Birney
TPDS
2008
133views more  TPDS 2008»
14 years 11 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
JPDC
2007
112views more  JPDC 2007»
14 years 11 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
IJRR
2000
117views more  IJRR 2000»
14 years 11 months ago
Singularity-Consistent Parameterization of Robot Motion and Control
The inverse kinematics problem is formulated as a parameterized autonomous dynamical system problem, and respective analysis is carried out. It is shown that a singular point of w...
Dragomir N. Nenchev, Yuichi Tsumaki, Masaru Uchiya...
SAS
2010
Springer
121views Formal Methods» more  SAS 2010»
14 years 10 months ago
Alternation for Termination
Proving termination of sequential programs is an important problem, both for establishing the total correctness of systems and as a component of proving more general termination an...
William R. Harris, Akash Lal, Aditya V. Nori, Srir...