Sciweavers

5448 search results - page 1083 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
WWW
2010
ACM
13 years 7 months ago
Using a model of social dynamics to predict popularity of news
Popularity of content in social media is unequally distributed, with some items receiving a disproportionate share of attention from users. Predicting which newly-submitted items ...
Kristina Lerman, Tad Hogg
AROBOTS
2010
180views more  AROBOTS 2010»
13 years 7 months ago
Reactive direction control for a mobile robot: a locust-like control of escape direction emerges when a bilateral pair of model
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...
BIOINFORMATICS
2010
127views more  BIOINFORMATICS 2010»
13 years 7 months ago
Analyzing taxonomic classification using extensible Markov models
Motivation: As next generation sequencing is rapidly adding new genomes, their correct placement in the taxonomy needs verification. However, the current methods for confirming cl...
Rao M. Kotamarti, Michael Hahsler, Douglas Raiford...
BMCBI
2007
153views more  BMCBI 2007»
13 years 7 months ago
Estimating genealogies from linked marker data: a Bayesian approach
Background: Answers to several fundamental questions in statistical genetics would ideally require knowledge of the ancestral pedigree and of the gene flow therein. A few examples...
Dario Gasbarra, Matti Pirinen, Mikko J. Sillanp&au...
« Prev « First page 1083 / 1090 Last » Next »