Sciweavers

3104 search results - page 278 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
BMCBI
2010
123views more  BMCBI 2010»
15 years 5 months ago
Computationally efficient flux variability analysis
Background: Flux variability analysis is often used to determine robustness of metabolic models in various simulation conditions. However, its use has been somehow limited by the ...
Steinn Gudmundsson, Ines Thiele
144
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 4 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CHI
2011
ACM
14 years 8 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
122
Voted
DAGM
2006
Springer
15 years 8 months ago
Classifying Event-Related Desynchronization in EEG, ECoG and MEG Signals
We present the results from three motor-imagery-based Brain-Computer Interface experiments. Brain signals were recorded from 8 untrained subjects using EEG, 4 using ECoG and 10 us...
N. Jeremy Hill, Thomas Navin Lal, Michael Schr&oum...
IPL
2007
80views more  IPL 2007»
15 years 4 months ago
Execution time analysis of a top-down R-tree construction algorithm
A detailed CPU execution-time analysis and implementation are given for a bulk loading algorithm to construct R-trees due to García et al. [Y.J. García, M.A. López, S.T. Leuten...
Houman Alborzi, Hanan Samet