Sciweavers

164 search results - page 31 / 33
» A Linear Belief Function Approach to Portfolio Evaluation
Sort
View
RTCSA
2006
IEEE
14 years 1 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
INFOCOM
2009
IEEE
14 years 2 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
BMCBI
2008
218views more  BMCBI 2008»
13 years 7 months ago
LOSITAN: A workbench to detect molecular adaptation based on a Fst-outlier method
Background: Testing for selection is becoming one of the most important steps in the analysis of multilocus population genetics data sets. Existing applications are difficult to u...
Tiago Antao, Ana Lopes, Ricardo J. Lopes, Albano B...
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
Gene set enrichment analysis for non-monotone association and multiple experimental categories
Background: Recently, microarray data analyses using functional pathway information, e.g., gene set enrichment analysis (GSEA) and significance analysis of function and expression...
Rongheng Lin, Shuangshuang Dai, Richard D. Irwin, ...
GIS
2010
ACM
13 years 6 months ago
Spatial data infrastructures as complex adaptive systems
Many researchers throughout the world have been struggling to better understand and describe Spatial Data Infrastructures (SDIs). Our knowledge of the real forces and mechanisms b...
L. Grus, Joep Crompvoets, A. K. Bregt