Sciweavers

440 search results - page 48 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 11 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
BMCBI
2006
126views more  BMCBI 2006»
13 years 11 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
BIBM
2010
IEEE
161views Bioinformatics» more  BIBM 2010»
13 years 9 months ago
Cis-regulatory module detection using constraint programming
We propose a method for finding CRMs in a set of co-regulated genes. Each CRM consists of a set of binding sites of transcription factors. We wish to find CRMs involving the same t...
Tias Guns, Hong Sun, Kathleen Marchal, Siegfried N...
BIBE
2010
IEEE
181views Bioinformatics» more  BIBE 2010»
14 years 3 days ago
Multi Level Clustering of Phylogenetic Profiles
The prediction of gene function from genome sequences is one of the main issues in Bioinformatics. Most computational approaches are based on the similarity between sequences to in...
Fotis E. Psomopoulos, Pericles A. Mitkas
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
14 years 2 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...