Sciweavers

635 search results - page 123 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
BMCBI
2010
233views more  BMCBI 2010»
13 years 7 months ago
Odefy -- From discrete to continuous models
Background: Phenomenological information about regulatory interactions is frequently available and can be readily converted to Boolean models. Fully quantitative models, on the ot...
Jan Krumsiek, Sebastian Pölsterl, Dominik M. ...
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
An analytic and systematic framework for estimating metabolic flux ratios from 13C tracer experiments
Background: Metabolic fluxes provide invaluable insight on the integrated response of a cell to environmental stimuli or genetic modifications. Current computational methods for e...
Ari Rantanen, Juho Rousu, Paula Jouhten, Nicola Za...
MMMACNS
2005
Springer
14 years 1 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
IEEEPACT
2008
IEEE
14 years 2 months ago
Feature selection and policy optimization for distributed instruction placement using reinforcement learning
Communication overheads are one of the fundamental challenges in a multiprocessor system. As the number of processors on a chip increases, communication overheads and the distribu...
Katherine E. Coons, Behnam Robatmili, Matthew E. T...