Sciweavers

1318 search results - page 253 / 264
» Measuring network security using dynamic bayesian network
Sort
View
BMCBI
2007
154views more  BMCBI 2007»
13 years 7 months ago
h-Profile plots for the discovery and exploration of patterns in gene expression data with an application to time course data
Background: An ever increasing number of techniques are being used to find genes with similar profiles from microarray studies. Visualization of gene expression profiles can aid t...
Yvonne E. Pittelkow, Susan R. Wilson
IEEECIT
2009
IEEE
14 years 2 months ago
A Highly Efficient Inter-domain Communication Channel
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun,...
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
MDM
2009
Springer
138views Communications» more  MDM 2009»
14 years 2 months ago
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
—In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduli...
Adrian Daniel Popescu, Mohamed A. Sharaf, Cristian...
NOSSDAV
2009
Springer
14 years 2 months ago
Power efficient real-time disk scheduling
Hard-disk drive power consumption reduction methods focus mainly on increasing the amount of time the disk is in standby mode (disk spun down) by implementing aggressive data read...
Damien Le Moal, Donald Molaro, Jorge Campello