Sciweavers

1400 search results - page 269 / 280
» Bayesian hierarchical clustering
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
14 years 23 days ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 12 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
DL
1998
Springer
111views Digital Library» more  DL 1998»
13 years 12 months ago
SONIA: A Service for Organizing Networked Information Autonomously
The recent explosion of on-line information in Digital Libraries and on the World Wide Web has given rise to a number of query-based search engines and manually constructed topica...
Mehran Sahami, Salim Yusufali, Michelle Q. Wang Ba...
BMCBI
2006
138views more  BMCBI 2006»
13 years 7 months ago
Determination of strongly overlapping signaling activity from microarray data
Background: As numerous diseases involve errors in signal transduction, modern therapeutics often target proteins involved in cellular signaling. Interpretation of the activity of...
Ghislain Bidaut, Karsten Suhre, Jean-Michel Claver...