Sciweavers

1748 search results - page 248 / 350
» Security Models for Heterogeneous Networking
Sort
View
145
Voted
ESANN
2004
15 years 4 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
BMCBI
2007
157views more  BMCBI 2007»
15 years 3 months ago
A hybrid multiscale Monte Carlo algorithm (HyMSMC) to cope with disparity in time scales and species populations in intracellula
Background: The fundamental role that intrinsic stochasticity plays in cellular functions has been shown via numerous computational and experimental studies. In the face of such e...
Asawari Samant, Babatunde A. Ogunnaike, Dionisios ...
170
Voted
JCM
2008
242views more  JCM 2008»
15 years 3 months ago
SimANet - A Large Scalable, Distributed Simulation Framework for Ambient Networks
In this paper, we present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. SimANet - Simulation Platform for Ambient Networks - allows the coe...
Matthias Vodel, Matthias Sauppe, Mirko Caspar, Wol...
135
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
150
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...