Sciweavers

3303 search results - page 645 / 661
» Affective e-Learning: Using
Sort
View
BMCBI
2007
147views more  BMCBI 2007»
13 years 8 months ago
Modeling biochemical transformation processes and information processing with Narrator
Background: Software tools that model and simulate the dynamics of biological processes and systems are becoming increasingly important. Some of these tools offer sophisticated gr...
Johannes J. Mandel, Hendrik Fuß, Niall M. Pa...
BMCBI
2007
186views more  BMCBI 2007»
13 years 8 months ago
Modeling human cancer-related regulatory modules by GA-RNN hybrid algorithms
Background: Modeling cancer-related regulatory modules from gene expression profiling of cancer tissues is expected to contribute to our understanding of cancer biology as well as...
Jung-Hsien Chiang, Shih-Yi Chao
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 8 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
CN
2007
98views more  CN 2007»
13 years 8 months ago
Analysis of point-to-point packet delay in an operational network
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...
IOR
2008
126views more  IOR 2008»
13 years 8 months ago
Fast Simulation of Multifactor Portfolio Credit Risk
This paper develops rare event simulation methods for the estimation of portfolio credit risk -- the risk of losses to a portfolio resulting from defaults of assets in the portfol...
Paul Glasserman, Wanmo Kang, Perwez Shahabuddin