This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
We study the survivable version of the game theoretic network formation model known as the Connection Game, originally introduced in [5]. In this model, players attempt to connect ...
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
Background: Activities of drug molecules can be predicted by QSAR (quantitative structure activity relationship) models, which overcomes the disadvantages of high cost and long cy...
Guo-Zheng Li, Hao-Hua Meng, Mary Qu Yang, Jack Y. ...