Sciweavers

1931 search results - page 379 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
CCS
2010
ACM
13 years 7 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
BMCBI
2010
106views more  BMCBI 2010»
13 years 7 months ago
A novel approach for haplotype-based association analysis using family data
Background: Haplotype-based approaches have been extensively studied for case-control association mapping in recent years. It has been shown that haplotype methods can provide mor...
Yixuan Chen, Xin Li, Jing Li
BMCBI
2008
159views more  BMCBI 2008»
13 years 7 months ago
Estimation and testing for the effect of a genetic pathway on a disease outcome using logistic kernel machine regression via log
Background: Growing interest on biological pathways has called for new statistical methods for modeling and testing a genetic pathway effect on a health outcome. The fact that gen...
Dawei Liu, Debashis Ghosh, Xihong Lin
CN
2008
98views more  CN 2008»
13 years 7 months ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...
ASE
2006
110views more  ASE 2006»
13 years 7 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang