Sciweavers

19832 search results - page 3887 / 3967
» The Korrontea Data Modeling
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
15 years 1 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ALMOB
2006
138views more  ALMOB 2006»
15 years 1 months ago
A combinatorial optimization approach for diverse motif finding applications
Background: Discovering approximately repeated patterns, or motifs, in biological sequences is an important and widely-studied problem in computational molecular biology. Most fre...
Elena Zaslavsky, Mona Singh
ALMOB
2006
110views more  ALMOB 2006»
15 years 1 months ago
New journal: Algorithms for Molecular Biology
This editorial announces Algorithms for Molecular Biology, a new online open access journal published by BioMed Central. By launching the first open access journal on algorithmic ...
Burkhard Morgenstern, Peter F. Stadler
ESWA
2008
219views more  ESWA 2008»
15 years 1 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee
BIOINFORMATICS
2006
92views more  BIOINFORMATICS 2006»
15 years 1 months ago
What should be expected from feature selection in small-sample settings
Motivation: High-throughput technologies for rapid measurement of vast numbers of biological variables offer the potential for highly discriminatory diagnosis and prognosis; howev...
Chao Sima, Edward R. Dougherty
« Prev « First page 3887 / 3967 Last » Next »