Sciweavers

2236 search results - page 434 / 448
» Intrusion detection techniques and approaches
Sort
View
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 9 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
BMCBI
2008
124views more  BMCBI 2008»
13 years 7 months ago
A probe-treatment-reference (PTR) model for the analysis of oligonucleotide expression microarrays
Background: Microarray pre-processing usually consists of normalization and summarization. Normalization aims to remove non-biological variations across different arrays. The norm...
Huanying Ge, Chao Cheng, Lei M. Li
KAIS
2008
221views more  KAIS 2008»
13 years 7 months ago
Forecasting skewed biased stochastic ozone days: analyses, solutions and beyond
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently, we have been approached by Texas Commission on En...
Kun Zhang, Wei Fan
BMCBI
2005
112views more  BMCBI 2005»
13 years 7 months ago
Vector analysis as a fast and easy method to compare gene expression responses between different experimental backgrounds
Background: Gene expression studies increasingly compare expression responses between different experimental backgrounds (genetic, physiological, or phylogenetic). By focusing on ...
Rainer Breitling, Patrick Armengaud, Anna Amtmann
TSE
2008
236views more  TSE 2008»
13 years 7 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...