Sciweavers

77 search results - page 13 / 16
» New perspectives and methods in link prediction
Sort
View
ITIIS
2010
172views more  ITIIS 2010»
13 years 5 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
CSB
2003
IEEE
118views Bioinformatics» more  CSB 2003»
13 years 12 months ago
Automated Protein NMR Resonance Assignments
NMR resonance peak assignment is one of the key steps in solving an NMR protein structure. The assignment process links resonance peaks to individual residues of the target protei...
Xiang Wan, Dong Xu, Carolyn M. Slupsky, Guohui Lin
BMCBI
2008
121views more  BMCBI 2008»
13 years 6 months ago
Microarray data mining using landmark gene-guided clustering
Background: Clustering is a popular data exploration technique widely used in microarray data analysis. Most conventional clustering algorithms, however, generate only one set of ...
Pankaj Chopra, Jaewoo Kang, Jiong Yang, HyungJun C...
IJFCS
2006
130views more  IJFCS 2006»
13 years 6 months ago
Mealy multiset automata
We introduce the networks of Mealy multiset automata, and study their computational power. The networks of Mealy multiset automata are computationally complete. 1 Learning from Mo...
Gabriel Ciobanu, Viorel Mihai Gontineac
CHI
2002
ACM
14 years 7 months ago
Cognitive walkthrough for the web
This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...