Sciweavers

7544 search results - page 1497 / 1509
» Network Forensics Analysis
Sort
View
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 7 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
CN
2007
99views more  CN 2007»
13 years 7 months ago
Mistreatment-resilient distributed caching
The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is ...
Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bes...
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 7 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
JCST
2008
124views more  JCST 2008»
13 years 7 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
« Prev « First page 1497 / 1509 Last » Next »