Sciweavers

22114 search results - page 4343 / 4423
» Use of Models and Modelling Techniques for Service Developme...
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
15 years 5 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ENTCS
2008
91views more  ENTCS 2008»
15 years 5 months ago
Expressing Priorities and External Probabilities in Process Algebra via Mixed Open/Closed Systems
Defining operational semantics for a process algebra is often based either on labeled transition systems that account for interaction with a context or on the so-called reduction ...
Mario Bravetti
APIN
2006
90views more  APIN 2006»
15 years 5 months ago
AgentTeamwork: Coordinating grid-computing jobs with mobile agents
AgentTeamwork is a grid-computing middleware system that dispatches a collection of mobile agents to coordinate a user job over remote computing nodes in a decentralized manner. I...
Munehiro Fukuda, Koichi Kashiwagi, Shin-ya Kobayas...
144
Voted
BMCBI
2006
82views more  BMCBI 2006»
15 years 5 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...
BMCBI
2006
164views more  BMCBI 2006»
15 years 5 months ago
Evaluation of clustering algorithms for gene expression data
Background: Cluster analysis is an integral part of high dimensional data analysis. In the context of large scale gene expression data, a filtered set of genes are grouped togethe...
Susmita Datta, Somnath Datta
« Prev « First page 4343 / 4423 Last » Next »