Sciweavers

156 search results - page 30 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
BMCBI
2008
116views more  BMCBI 2008»
13 years 7 months ago
IgTM: An algorithm to predict transmembrane domains and topology in proteins
Background: Due to their role of receptors or transporters, membrane proteins play a key role in many important biological functions. In our work we used Grammatical Inference (GI...
Piedachu Peris, Damián López, Marcel...
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
13 years 11 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 1 months ago
Efficient Coverage Planning for Grid-Based Wireless Sensor Networks
- In this paper we study efficient triangular grid-based sensor deployment planning for coverage when sensor placements are perturbed by random errors around their corresponding gr...
Glen Takahara, Kenan Xu, Hossam S. Hassanein
BMCBI
2010
156views more  BMCBI 2010»
13 years 7 months ago
Extended morphological processing: a practical method for automatic spot detection of biological markers from microscopic images
Background: A reliable extraction technique for resolving multiple spots in light or electron microscopic images is essential in investigations of the spatial distribution and dyn...
Yoshitaka Kimori, Norio Baba, Nobuhiro Morone