Sciweavers

495 search results - page 63 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
RECOMB
2012
Springer
12 years 2 days ago
A Model for Biased Fractionation after Whole Genome Duplication
Background: Paralog reduction, the loss of duplicate genes after whole genome duplication (WGD) is a pervasive process. Whether this loss proceeds gene by gene or through deletion...
David Sankoff, Chunfang Zheng, Baoyong Wang
ADHOC
2010
317views more  ADHOC 2010»
13 years 6 months ago
Simple ant routing algorithm strategies for a (Multipurpose) MANET model
A Mobile Ad-hoc Network has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. The Simple Ant Routing Algorithm (SARA...
Fernando Correia, Teresa Vazão
ISMIS
1997
Springer
14 years 1 months ago
Discovering Empirical Equations from Robot-Collected Data
Discovery of multidimensional empirical equations has been a task of systems such as BACON and FAHRENHEIT. When confronted with data collected in a robotic experiment, BACON-like g...
Kuang-Ming Huang, Jan M. Zytkow
SMA
2010
ACM
204views Solid Modeling» more  SMA 2010»
13 years 10 months ago
Topologically correct reconstruction of tortuous contour forests
Electrophysiological modeling of dendrites and other neurological processes is generally done in a simplified manner, by treating these structures as a series of cylinders (aka ca...
John Edwards, Chandrajit L. Bajaj
OTM
2007
Springer
14 years 3 months ago
The OpenKnowledge System: An Interaction-Centered Approach to Knowledge Sharing
The information that is made available through the semantic web will be accessed through complex programs (web-services, sensors, etc.) that may interact in sophisticated ways. Com...
Ronny Siebes, David Dupplaw, Spyros Kotoulas, Adri...