Sciweavers

418 search results - page 73 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
APNOMS
2008
Springer
13 years 9 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
BMCBI
2008
149views more  BMCBI 2008»
13 years 7 months ago
Evolution of biological sequences implies an extreme value distribution of type I for both global and local pairwise alignment s
Background: Confidence in pairwise alignments of biological sequences, obtained by various methods such as Blast or Smith-Waterman, is critical for automatic analyses of genomic d...
Olivier Bastien, Eric Maréchal
SAC
2004
ACM
14 years 27 days ago
Towards a flexible, process-oriented IT architecture for an integrated healthcare network
Healthcare information systems play an important role in improving healthcare quality. As providing healthcare increasingly changes from isolated treatment episodes towards a cont...
Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan ...
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
14 years 1 months ago
Prediction method to maintain QoS in weather impacted wireless and satellite networks
—Rain and snow can have a distorting effect on Ku and Ka bands signal fidelity resulting in excessive digital transmission errors. This loss of signal attenuation is commonly ref...
Kamal Harb, Anand Srinivasan, Changcheng Huang, Br...
MOBISYS
2007
ACM
14 years 7 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...