Sciweavers

191 search results - page 34 / 39
» Detecting Conserved Interaction Patterns in Biological Netwo...
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
IJCNN
2006
IEEE
14 years 1 months ago
Training Coordination Proxy Agents
— Delegating the coordination role to proxy agents can improve the overall outcome of the task at the expense of cognitive overload due to switching subtasks. Stability and commi...
Myriam Abramson, William Chao, Ranjeev Mittu
CASCON
2007
106views Education» more  CASCON 2007»
13 years 9 months ago
Identifying active subgroups in online communities
As online communities proliferate, methods are needed to explore and capture patterns of activity within them. This paper focuses on the problem of identifying active subgroups wi...
Alvin Chin, Mark H. Chignell
BMCBI
2010
233views more  BMCBI 2010»
13 years 7 months ago
Odefy -- From discrete to continuous models
Background: Phenomenological information about regulatory interactions is frequently available and can be readily converted to Boolean models. Fully quantitative models, on the ot...
Jan Krumsiek, Sebastian Pölsterl, Dominik M. ...
BMCBI
2010
172views more  BMCBI 2010»
13 years 7 months ago
Inferring gene regression networks with model trees
Background: Novel strategies are required in order to handle the huge amount of data produced by microarray technologies. To infer gene regulatory networks, the first step is to f...
Isabel A. Nepomuceno-Chamorro, Jesús S. Agu...