Sciweavers

2950 search results - page 557 / 590
» Computing with Infinitely Many Processes
Sort
View
CSREASAM
2006
13 years 10 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
ISSA
2004
13 years 10 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
PICS
1998
13 years 10 months ago
The Important Roles of Inks and Media in the Light Fading Stability of Inkjet Prints
In the fine art field, the high-resolution inkjet printers made by IRIS Graphics, Inc. have for more than 7 years remained the preferred direct digital output device for printing ...
Henry Wilhelm, Mark H. McCormick-Goodhart
BMCBI
2007
130views more  BMCBI 2007»
13 years 9 months ago
Exploiting residue-level and profile-level interface propensities for usage in binding sites prediction of proteins
Background: Recognition of binding sites in proteins is a direct computational approach to the characterization of proteins in terms of biological and biochemical function. Residu...
Qiwen Dong, Xiaolong Wang, Lei Lin, Yi Guan
BMCBI
2010
142views more  BMCBI 2010»
13 years 9 months ago
Discover Protein Complexes in Protein-Protein Interaction Networks Using Parametric Local Modularity
Background: Recent advances in proteomic technologies have enabled us to create detailed protein-protein interaction maps in multiple species and in both normal and diseased cells...
Jongkwang Kim, Kai Tan