Sciweavers

2006 search results - page 401 / 402
» Heuristic Security-Testing Methods
Sort
View
TCBB
2010
136views more  TCBB 2010»
13 years 7 months ago
Efficient Extraction of Protein-Protein Interactions from Full-Text Articles
—Proteins and their interactions govern virtually all cellular processes, such as regulation, signaling, metabolism, and structure. Most experimental findings pertaining to such ...
Jörg Hakenberg, Robert Leaman, Nguyen Ha Vo, ...
TOMACS
2010
182views more  TOMACS 2010»
13 years 7 months ago
State-dependent importance sampling for a Jackson tandem network
This paper considers importance sampling as a tool for rare-event simulation. The focus is on estimating the probability of overflow in the downstream queue of a Jacksonian two-n...
Denis I. Miretskiy, Werner R. W. Scheinhardt, Mich...
GLOBECOM
2010
IEEE
13 years 7 months ago
Column Generation for Dimensioning Resilient Optical Grid Networks with Relocation
Nowadays, the Quality of Service (QoS) in Optical Grids has become a key issue. An important QoS factor is the resiliency, namely the ability to survive from certain network failur...
Brigitte Jaumard, Jens Buysse, Ali Shaikh, Marc De...
ICRA
2009
IEEE
218views Robotics» more  ICRA 2009»
13 years 6 months ago
Automatically and efficiently inferring the hierarchical structure of visual maps
In Simultaneous Localisation and Mapping (SLAM), it is well known that probabilistic filtering approaches which aim to estimate the robot and map state sequentially suffer from poo...
Margarita Chli, Andrew J. Davison
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 5 months ago
Improving the Performance of maxRPC
Max Restricted Path Consistency (maxRPC) is a local consistency for binary constraints that can achieve considerably stronger pruning than arc consistency. However, existing maxRPC...
Thanasis Balafoutis, Anastasia Paparrizou, Kostas ...