Sciweavers

1639 search results - page 267 / 328
» Degree-constrained network flows
Sort
View
USS
2004
13 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
BMCBI
2007
136views more  BMCBI 2007»
13 years 10 months ago
Reduced modeling of signal transduction - a modular approach
Background: Combinatorial complexity is a challenging problem in detailed and mechanistic mathematical modeling of signal transduction. This subject has been discussed intensively...
Markus Koschorreck, Holger Conzelmann, Sybille Ebe...
BMCBI
2006
205views more  BMCBI 2006»
13 years 10 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch
NN
2000
Springer
170views Neural Networks» more  NN 2000»
13 years 9 months ago
Synthetic brain imaging: grasping, mirror neurons and imitation
The article contributes to the quest to relate global data on brain and behavior (e.g. from PET, Positron Emission Tomography, and fMRI, functional Magnetic Resonance Imaging) to ...
Michael A. Arbib, Aude Billard, Marco Iacoboni, Er...
INTERSENSE
2006
ACM
14 years 3 months ago
QoS-aware mesh construction to enhance multicast routing in mobile ad hoc networks
— Mobile Ad-hoc Networks (MANETs) are seen as an essential technology to support future Pervasive Computing Scenarios and 4G networks. In a MANET, efficient support of multipoint...
Harald Tebbe, Andreas J. Kassler, Pedro M. Ruiz