Sciweavers

495 search results - page 95 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
EON
2008
13 years 9 months ago
Synthesizing the Mediator with jABC/ABC
Abstract. In this paper we show how to apply a tableau-based software composition technique to automatically generate the mediator's service logic. This uses an LTL planning (...
Tiziana Margaria
BMCBI
2010
132views more  BMCBI 2010»
13 years 7 months ago
Error margin analysis for feature gene extraction
Background: Feature gene extraction is a fundamental issue in microarray-based biomarker discovery. It is normally treated as an optimization problem of finding the best predictiv...
Chi Kin Chow, Hai Long Zhu, Jessica Lacy, Winston ...
JNW
2006
68views more  JNW 2006»
13 years 7 months ago
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topolo...
Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee...
MONET
2006
129views more  MONET 2006»
13 years 7 months ago
Enabling Intelligent Handovers in Heterogeneous Wireless Networks
In the future Wireless Internet, mobile nodes will be able to choose between providers offering competing services at a much finer granularity than we find today. Rather than month...
Robert C. Chalmers, Govind Krishnamurthi, Kevin C....
BMCBI
2007
174views more  BMCBI 2007»
13 years 7 months ago
Inferring activity changes of transcription factors by binding association with sorted expression profiles
Background: The identification of transcription factors (TFs) associated with a biological process is fundamental to understanding its regulatory mechanisms. From microarray data,...
Chao Cheng, Xiting Yan, Fengzhu Sun, Lei M. Li