Sciweavers

2135 search results - page 110 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
WSCG
2004
163views more  WSCG 2004»
13 years 9 months ago
Fairing of Polygon Meshes Via Bayesian Discriminant Analysis
Design of an anisotropic diffusion-based filter that performs Bayesian classification for automatic selection of a proper weight for fairing polygon meshes is proposed. The data a...
Chun-Yen Chen, Kuo-Young Cheng, Hong-Yuan Mark Lia...
BMCBI
2007
134views more  BMCBI 2007»
13 years 8 months ago
A framework for significance analysis of gene expression data using dimension reduction methods
Background: The most popular methods for significance analysis on microarray data are well suited to find genes differentially expressed across predefined categories. However, ide...
Lars Halvor Gidskehaug, Endre Anderssen, Arnar Fla...
CACM
2006
102views more  CACM 2006»
13 years 8 months ago
Argumentation support: from technologies to tools
Electronic argumentation support is increasingly important in today's networked society. Virtual research collaboration, e-business, and many other domains of professional li...
Aldo de Moor, Mark Aakhus
CORR
2004
Springer
151views Education» more  CORR 2004»
13 years 8 months ago
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occ...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...