Sciweavers

212 search results - page 35 / 43
» Hybrid Analysis and Control of Malware
Sort
View
WSC
1997
13 years 11 months ago
A Simulation Environment for the Coordinated Operation of Multiple Autonomous Underwater Vehicles
A simulation environment of the coordinated operation of multiple Autonomous Underwater Vehicles (AUVs) is presented. The primary application of this simulation environment is the...
João Borges de Sousa, Aleks Göllü
TCSV
2002
114views more  TCSV 2002»
13 years 10 months ago
Multicast and unicast real-time video streaming over wireless LANs
In this paper, we address the problem of real-time video streaming over wireless LANs for both unicast and multicast transmission. The wireless channel is modeled as a packet-erasu...
Abhik Majumdar, Daniel Grobe Sachs, Igor Kozintsev...
RTAS
2008
IEEE
14 years 4 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
BMCBI
2008
122views more  BMCBI 2008»
13 years 10 months ago
Determining gene expression on a single pair of microarrays
Background: In microarray experiments the numbers of replicates are often limited due to factors such as cost, availability of sample or poor hybridization. There are currently fe...
Robert W. Reid, Anthony A. Fodor
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 10 months ago
High-throughput Protein Interactome Data: Minable or Not?
There is an emerging trend in post-genome biology to study the collection of thousands of protein interaction pairs (protein interactome) derived from high-throughput experiments....
Jake Yue Chen, Andrey Y. Sivachenko, Lang Li