Sciweavers

708 search results - page 125 / 142
» A Heuristic Approach to Detect Feature Interactions in Requi...
Sort
View
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
BMCBI
2007
114views more  BMCBI 2007»
13 years 6 months ago
Gene models from ESTs (GeneModelEST): an application on the Solanum lycopersicum genome
Background: The structure annotation of a genome is based either on ab initio methodologies or on similaritiy searches versus molecules that have been already annotated. Ab initio...
Nunzio D'Agostino, Alessandra Traini, Luigi Frusci...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 6 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
BMCBI
2010
172views more  BMCBI 2010»
13 years 6 months ago
Inferring gene regression networks with model trees
Background: Novel strategies are required in order to handle the huge amount of data produced by microarray technologies. To infer gene regulatory networks, the first step is to f...
Isabel A. Nepomuceno-Chamorro, Jesús S. Agu...
ISCA
2003
IEEE
150views Hardware» more  ISCA 2003»
14 years 14 hour ago
Cyclone: A Broadcast-Free Dynamic Instruction Scheduler with Selective Replay
To achieve high instruction throughput, instruction schedulers must be capable of producing high-quality schedules that maximize functional unit utilization while at the same time...
Dan Ernst, Andrew Hamel, Todd M. Austin