Sciweavers

1224 search results - page 139 / 245
» Modeling and performance analysis of BitTorrent-like peer-to...
Sort
View
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ANSS
2004
IEEE
14 years 29 days ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
DSN
2002
IEEE
14 years 2 months ago
Evaluation of the Maximum Level Reached by a Queue Over a Finite Period
This paper deals with the performance analysis of a system modeled by a queue. If we are interested in occupation problems and if we look at the transient phase, then it makes sen...
Gerardo Rubino
BMCBI
2010
149views more  BMCBI 2010»
13 years 9 months ago
RuleMonkey: software for stochastic simulation of rule-based models
Background: The system-level dynamics of many molecular interactions, particularly protein-protein interactions, can be conveniently represented using reaction rules, which can be...
Joshua Colvin, Michael I. Monine, Ryan N. Gutenkun...
BMCBI
2007
146views more  BMCBI 2007»
13 years 9 months ago
Bayesian hierarchical model for transcriptional module discovery by jointly modeling gene expression and ChIP-chip data
Background: Transcriptional modules (TM) consist of groups of co-regulated genes and transcription factors (TF) regulating their expression. Two high-throughput (HT) experimental ...
Xiangdong Liu, Walter J. Jessen, Siva Sivaganesan,...