Sciweavers

12183 search results - page 2391 / 2437
» Computers under Attacks!
Sort
View
BMCBI
2006
114views more  BMCBI 2006»
13 years 8 months ago
BLISS: biding site level identification of shared signal-modules in DNA regulatory sequences
Background: Regulatory modules are segments of the DNA that control particular aspects of gene expression. Their identification is therefore of great importance to the field of mo...
Hailong Meng, Arunava Banerjee, Lei Zhou
CLASSIFICATION
2006
108views more  CLASSIFICATION 2006»
13 years 8 months ago
The Practice of Cluster Analysis
Abstracts "Mixtures at the Interface" David Scott, Rice University Mixture modeling provides an effective framework for complex, high-dimensional data. The potential of m...
Jon R. Kettenring
CN
2006
91views more  CN 2006»
13 years 8 months ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis
CN
2006
163views more  CN 2006»
13 years 8 months ago
A framework for mining evolving trends in Web data streams using dynamic learning and retrospective validation
The expanding and dynamic nature of the Web poses enormous challenges to most data mining techniques that try to extract patterns from Web data, such as Web usage and Web content....
Olfa Nasraoui, Carlos Rojas, Cesar Cardona
COMCOM
2006
147views more  COMCOM 2006»
13 years 8 months ago
Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks
Due to the application-specific nature of wireless sensor networks, application-aware algorithm and protocol design paradigms are highly required in order to optimize the overall ...
Wook Choi, Sajal K. Das
« Prev « First page 2391 / 2437 Last » Next »