Sciweavers

311 search results - page 60 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
BMCBI
2008
150views more  BMCBI 2008»
13 years 7 months ago
13C labeling experiments at metabolic nonstationary conditions: An exploratory study
Background: Stimulus Response Experiments to unravel the regulatory properties of metabolic networks are becoming more and more popular. However, their ability to determine enzyme...
Sebastian Aljoscha Wahl, Katharina Nöh, Wolfg...
INFOCOM
2009
IEEE
14 years 2 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
BMCBI
2008
126views more  BMCBI 2008»
13 years 7 months ago
Combining Shapley value and statistics to the analysis of gene expression data in children exposed to air pollution
Background: In gene expression analysis, statistical tests for differential gene expression provide lists of candidate genes having, individually, a sufficiently low p-value. Howe...
Stefano Moretti, Danitsja van Leeuwen, Hans Gmuend...
CN
2008
128views more  CN 2008»
13 years 7 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
CORR
2010
Springer
195views Education» more  CORR 2010»
13 years 7 months ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...