Sciweavers

23988 search results - page 4497 / 4798
» Social Network Computing
Sort
View
153
Voted
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a â...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
132
Voted
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
15 years 11 months ago
Distributed subgradient methods and quantization effects
Abstract— We consider a convex unconstrained optimization problem that arises in a network of agents whose goal is to cooperatively optimize the sum of the individual agent objec...
Angelia Nedic, Alexander Olshevsky, Asuman E. Ozda...
CEC
2008
IEEE
15 years 11 months ago
Automatic model type selection with heterogeneous evolution: An application to RF circuit block modeling
— Many complex, real world phenomena are difï¬cult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...
CEC
2008
IEEE
15 years 11 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CISIM
2008
IEEE
15 years 11 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
« Prev « First page 4497 / 4798 Last » Next »