Sciweavers

2131 search results - page 73 / 427
» Immunity for Closed Sets
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 10 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
BMCBI
2010
110views more  BMCBI 2010»
15 years 4 months ago
MultiRTA: A simple yet reliable method for predicting peptide binding affinities for multiple class II MHC allotypes
Background: The binding of peptide fragments of antigens to class II MHC is a crucial step in initiating a helper T cell immune response. The identification of such peptide epitop...
Andrew J. Bordner, Hans D. Mittelmann
JEI
2000
134views more  JEI 2000»
15 years 4 months ago
Pattern matching using the blur hit - miss transform
The usefulness of the hit-miss transform (HMT) and related transforms for pattern matching in document image applications is examined. Although the HMT is sensitive to the types o...
Dan S. Bloomberg, Luc Vincent
129
Voted
LPNMR
2005
Springer
15 years 10 months ago
The nomore++ System
Abstract. We present a new answer set solver nomore++. Distinguishing features include its treatment of heads and bodies equitably as computational objects and a new hybrid lookahe...
Christian Anger, Martin Gebser, Thomas Linke, Andr...
JSYML
2007
97views more  JSYML 2007»
15 years 4 months ago
Sublocales in formal topology
The paper studies how the localic notion of sublocale transfers to formal topology. For any formal topology (not necessarily with positivity predicate) we define a sublocale to b...
Steven Vickers