Sciweavers

4172 search results - page 817 / 835
» Computing Machinery and Understanding
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
TCAD
2008
114views more  TCAD 2008»
13 years 9 months ago
Test-Quality/Cost Optimization Using Output-Deviation-Based Reordering of Test Patterns
At-speed functional testing, delay testing, and n-detection test sets are being used today to detect deep submicrometer defects. However, the resulting test data volumes are too hi...
Zhanglei Wang, Krishnendu Chakrabarty
TCBB
2008
137views more  TCBB 2008»
13 years 9 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
BMCBI
2005
130views more  BMCBI 2005»
13 years 9 months ago
Some statistical properties of regulatory DNA sequences, and their use in predicting regulatory regions in the Drosophila genome
Background: This paper addresses the problem of recognising DNA cis-regulatory modules which are located far from genes. Experimental procedures for this are slow and costly, and ...
Irina I. Abnizova, Rene te Boekhorst, Klaudia Walt...