Sciweavers

1898 search results - page 367 / 380
» About the art in this issue
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
TIFS
2008
154views more  TIFS 2008»
13 years 7 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
BMCBI
2005
114views more  BMCBI 2005»
13 years 7 months ago
Extension of Lander-Waterman theory for sequencing filtered DNA libraries
Background: The degree to which conventional DNA sequencing techniques will be successful for highly repetitive genomes is unclear. Investigators are therefore considering various...
Michael C. Wendl, W. Bradley Barbazuk
BMCBI
2005
122views more  BMCBI 2005»
13 years 7 months ago
Finding genomic ontology terms in text using evidence content
Background: The development of text mining systems that annotate biological entities with their properties using scientific literature is an important recent research topic. These...
Francisco M. Couto, Mário J. Silva, Pedro C...
TMC
2008
112views more  TMC 2008»
13 years 7 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori