Sciweavers

837 search results - page 101 / 168
» A Compositional Approach on Modal Specifications for Timed S...
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
DSN
2004
IEEE
14 years 22 days ago
The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology Devices
Advanced molecular nanotechnology devices are expected to have exceedingly high transient fault rates and large numbers of inherent device defects compared to conventional CMOS de...
A. J. KleinOsowski, Kevin KleinOsowski, Vijay Rang...
BMCBI
2010
92views more  BMCBI 2010»
13 years 9 months ago
YODA: Software to facilitate high-throughput analysis of chronological life span, growth rate, and survival in budding yeast
Background: The budding yeast Saccharomyces cerevisiae is one of the most widely studied model organisms in aging-related science. Although several genetic modifiers of yeast long...
Brady Olsen, Christopher J. Murakami, Matt Kaeberl...
AAAI
2006
13 years 10 months ago
Multimodal Cognitive Architecture: Making Perception More Central to Intelligent Behavior
I propose that the notion of cognitive state be broadened from the current predicate-symbolic, Language-of-Thought framework to a multi-modal one, where perception and kinesthetic...
B. Chandrasekaran
FAST
2009
13 years 6 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte