Sciweavers

11973 search results - page 2351 / 2395
» Methods for organizational development
Sort
View
JCB
2006
144views more  JCB 2006»
13 years 11 months ago
Modeling Virus Self-Assembly Pathways: Avoiding Dynamics Using Geometric Constraint Decomposition
We develop a model for elucidating the assembly pathways by which an icosahedral viral shell forms from 60 identical constituent protein monomers. This poorly understood process a...
Meera Sitharam, Mavis Agbandje-Mckenna
DKE
2007
130views more  DKE 2007»
13 years 11 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
JUCS
2008
143views more  JUCS 2008»
13 years 11 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
JMM2
2006
151views more  JMM2 2006»
13 years 11 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
JPDC
2006
253views more  JPDC 2006»
13 years 11 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
« Prev « First page 2351 / 2395 Last » Next »