Sciweavers

7272 search results - page 1428 / 1455
» On the Performance of Selection Relaying
Sort
View
JCP
2006
157views more  JCP 2006»
13 years 9 months ago
CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference
Most Gene Regulatory Network (GRN) studies ignore the impact of the noisy nature of gene expression data despite its significant influence upon inferred results. This paper present...
Muhammad Shoaib B. Sehgal, Iqbal Gondal, Laurence ...
JCST
2006
99views more  JCST 2006»
13 years 9 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
JMLR
2006
132views more  JMLR 2006»
13 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
JPDC
2006
103views more  JPDC 2006»
13 years 9 months ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi
JPDC
2006
133views more  JPDC 2006»
13 years 9 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
« Prev « First page 1428 / 1455 Last » Next »