Sciweavers

2821 search results - page 513 / 565
» Tracing a single user
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 12 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
JSAC
2008
151views more  JSAC 2008»
14 years 11 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
JLP
2006
155views more  JLP 2006»
14 years 11 months ago
A formally grounded software specification method
One of the goals of software engineering is to provide what is necessary to write relevant, legible, useful descriptions of the systems to be developed, which will be the basis of...
Christine Choppy, Gianna Reggio
BMCBI
2005
115views more  BMCBI 2005»
14 years 11 months ago
Graphical representation of ribosomal RNA probe accessibility data using ARB software package
Background: Taxon specific hybridization probes in combination with a variety of commonly used hybridization formats nowadays are standard tools in microbial identification. A fre...
Yadhu Kumar, Ralf Westram, Sebastian Behrens, Bern...
BMCBI
2005
103views more  BMCBI 2005»
14 years 11 months ago
MicroGen: a MIAME compliant web system for microarray experiment information and workflow management
Background: Improvements of bio-nano-technologies and biomolecular techniques have led to increasing production of high-throughput experimental data. Spotted cDNA microarray is on...
Sarah Burgarella, Dario Cattaneo, Francesco Pincir...