Sciweavers

6010 search results - page 1187 / 1202
» Computational Approaches to Drug Design
Sort
View
CASES
2010
ACM
13 years 5 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
EUSFLAT
2009
117views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Type-II Fuzzy Possibilistic C-Mean Clustering
Fuzzy clustering is well known as a robust and efficient way to reduce computation cost to obtain the better results. In the literature, many robust fuzzy clustering models have be...
Mohammad Hossein Fazel Zarandi, Marzie Zarinbal, I...
AVI
2010
13 years 5 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
BMCBI
2010
162views more  BMCBI 2010»
13 years 5 months ago
SNPexp - A web tool for calculating and visualizing correlation between HapMap genotypes and gene expression levels
Background: Expression levels for 47294 transcripts in lymphoblastoid cell lines from all 270 HapMap phase II individuals, and genotypes (both HapMap phase II and III) of 3.96 mil...
Kristian Holm, Espen Melum, Andre Franke, Tom H. K...
« Prev « First page 1187 / 1202 Last » Next »