Sciweavers

347 search results - page 60 / 70
» Hierarchical Collectives in MPICH2
Sort
View
ISSA
2004
13 years 10 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
BMCBI
2010
109views more  BMCBI 2010»
13 years 8 months ago
Structural alphabets derived from attractors in conformational space
Background: The hierarchical and partially redundant nature of protein structures justifies the definition of frequently occurring conformations of short fragments as `states'...
Alessandro Pandini, Arianna Fornili, Jens Kleinjun...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 7 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICPADS
2010
IEEE
13 years 6 months ago
Enhancing MapReduce via Asynchronous Data Processing
The MapReduce programming model simplifies large-scale data processing on commodity clusters by having users specify a map function that processes input key/value pairs to generate...
Marwa Elteir, Heshan Lin, Wu-chun Feng
AIME
2007
Springer
14 years 2 months ago
An Intelligent Aide for Interpreting a Patient's Dialysis Data Set
Many machines used in the modern hospital settings offer real time physiological monitoring. Haemodialysis machines combine a therapeutic treatment system integrated with sophistic...
Derek H. Sleeman, Nick Fluck, Elias Gyftodimos, La...