Sciweavers

2357 search results - page 407 / 472
» Computing Refactorings of Behavior Models
Sort
View
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
DMSN
2004
ACM
14 years 1 months ago
Region streams: functional macroprogramming for sensor networks
Sensor networks present a number of novel programming challenges for application developers. Their inherent limitations of computational power, communication bandwidth, and energy...
Ryan Newton, Matt Welsh
INFOCOM
1993
IEEE
14 years 19 days ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
BMCBI
2004
112views more  BMCBI 2004»
13 years 8 months ago
MuTrack: a genome analysis system for large-scale mutagenesis in the mouse
Background: Modern biological research makes possible the comprehensive study and development of heritable mutations in the mouse model at high-throughput. Using techniques spanni...
Erich J. Baker, Leslie Galloway, Barbara Jackson, ...
TMI
2011
144views more  TMI 2011»
13 years 3 months ago
Automated Mitosis Detection of Stem Cell Populations in Phase-Contrast Microscopy Images
—Due to the enormous potential and impact that stem cells may have on regenerative medicine, there has been a rapidly growing interest for tools to analyze and characterize the b...
Seungil Huh, Dai Fei E. Ker, Ryoma Bise, Mei Chen,...