Sciweavers

1804 search results - page 318 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SSS
2009
Springer
14 years 3 months ago
Visiting Gafni's Reduction Land: From the BG Simulation to the Extended BG Simulation
: The Borowsky-Gafni (BG) simulation algorithm is a powerful tool that allows a set of t + 1 asynchronous sequential processes to wait-free simulate (i.e., despite the crash of up ...
Damien Imbs, Michel Raynal
BMCBI
2005
90views more  BMCBI 2005»
13 years 8 months ago
TMB-Hunt: An amino acid composition based method to screen proteomes for beta-barrel transmembrane proteins
Background: Beta-barrel transmembrane (bbtm) proteins are a functionally important and diverse group of proteins expressed in the outer membranes of bacteria (both gram negative a...
Andrew G. Garrow, Alison Agnew, David R. Westhead
ENTCS
2008
88views more  ENTCS 2008»
13 years 9 months ago
Behavior-Preserving Simulation-to-Animation Model and Rule Transformations
In the framework of graph transformation, simulation rules define the operational behavior of visual models. Moreover, it has been shown already how to construct animation rules f...
Claudia Ermel, Hartmut Ehrig
BILDMED
2009
128views Algorithms» more  BILDMED 2009»
13 years 10 months ago
Surface-Based Respiratory Motion Classification and Verification
To ensure precise tumor irradiation in radiotherapy a stable breathing pattern is mandatory as tumors are moving due to respiratory motion. Consequentially, irregularities of respi...
Kerstin Müller, Christian Schaller, Jochen Pe...
IRI
2005
IEEE
14 years 2 months ago
Comparing similarity calculation methods in conversational CBR
Abstract— Conversational Case-Based-Reasoning (CCBR) provides a mixed-initiative dialog for guiding users to construct their problem description incrementally through a question-...
Mingyang Gu, Xin Tong, Agnar Aamodt