Sciweavers

6689 search results - page 1269 / 1338
» A Network Security Monitor
Sort
View
WSC
2000
13 years 11 months ago
Use of discrete event simulation to validate an agent based scheduling engine
This paper discusses the use of simulation in a new context. Most often QUEST is viewed as a stand-alone simulation tool to analyze and understand shop floor behavior. It has rare...
Shubhabrata Biswas, Sara Merchawi
AIPS
2009
13 years 11 months ago
A Semantics for HTN Methods
Despite the extensive development of first-principles planning in recent years, planning applications are still primarily developed using knowledge-based planners which can exploi...
Robert P. Goldman
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
13 years 10 months ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
CN
2008
84views more  CN 2008»
13 years 10 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
BMCBI
2006
127views more  BMCBI 2006»
13 years 10 months ago
Improvement in the Reproducibility and Accuracy of DNA Microarray Quantification by Optimizing Hybridization Conditions
Background: DNA microarrays, which have been increasingly used to monitor mRNA transcripts at a global level, can provide detailed insight into cellular processes involved in resp...
Tao Han, Cathy D. Melvin, Leming M. Shi, William S...
« Prev « First page 1269 / 1338 Last » Next »