Sciweavers

1029 search results - page 127 / 206
» Dependence Anti Patterns
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
BMCBI
2006
126views more  BMCBI 2006»
13 years 10 months ago
Effect of data normalization on fuzzy clustering of DNA microarray data
Background: Microarray technology has made it possible to simultaneously measure the expression levels of large numbers of genes in a short time. Gene expression data is informati...
Seo Young Kim, Jae Won Lee, Jong Sung Bae
CORR
2011
Springer
145views Education» more  CORR 2011»
13 years 2 months ago
Collective Animal Behavior from Bayesian Estimation and Probability Matching
Animals living in groups make movement decisions that depend, among other factors, on social interactions with other group members. Our present understanding of social rules in an...
Alfonso Pérez-Escudero, Gonzalo G. de Polav...
HPCA
2001
IEEE
14 years 10 months ago
Self-Tuned Congestion Control for Multiprocessor Networks
Network performance in tightly-coupled multiprocessors typically degrades rapidly beyond network saturation. Consequently, designers must keep a network below its saturation point...
Mithuna Thottethodi, Alvin R. Lebeck, Shubhendu S....
IWCIA
2009
Springer
14 years 4 months ago
Signatures of Combinatorial Maps
Abstract. In this paper, we address the problem of computing a canonical representation of an n-dimensional combinatorial map. To do so, we define two combinatorial map signatures...
Stéphane Gosselin, Guillaume Damiand, Chris...