Sciweavers

2236 search results - page 383 / 448
» Intrusion detection techniques and approaches
Sort
View
BMCBI
2005
122views more  BMCBI 2005»
13 years 9 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
TOG
2008
102views more  TOG 2008»
13 years 9 months ago
Fluorescent immersion range scanning
The quality of a 3D range scan should not depend on the surface properties of the object. Most active range scanning techniques, however, assume a diffuse reflector to allow for a...
Matthias B. Hullin, Martin Fuchs, Ivo Ihrke, Hans-...
CN
2004
95views more  CN 2004»
13 years 9 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
ICS
2010
Tsinghua U.
13 years 7 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
ISBI
2006
IEEE
14 years 9 months ago
Mapping ventricular changes related to dementia and mild cognitive impairment in a large community-based cohort
We present a fully-automated technique for visualizing localized cerebral ventricle shape differences between large clinical subject groups who have received a magnetic resonance ...
Owen T. Carmichael, Paul M. Thompson, Rebecca A. D...