Sciweavers

15379 search results - page 2885 / 3076
» Protecting users from
Sort
View
148
Voted
ENTCS
2006
183views more  ENTCS 2006»
15 years 4 months ago
Metamodel-Based Model Transformation with Aspect-Oriented Constraints
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...
László Lengyel, Tihamer Levendovszky...
140
Voted
BMCBI
2007
160views more  BMCBI 2007»
15 years 4 months ago
Establishing a major cause of discrepancy in the calibration of Affymetrix GeneChips
Background: Affymetrix GeneChips are a popular platform for performing whole-genome experiments on the transcriptome. There are a range of different calibration steps, and users a...
Andrew P. Harrison, Caroline E. Johnston, Christin...
ISCI
2006
145views more  ISCI 2006»
15 years 4 months ago
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network traffic data, and stock market. Data streams consist of mostly nume...
Aykut Ünal, Yücel Saygin, Özgü...
ISI
2006
Springer
15 years 4 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 4 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
« Prev « First page 2885 / 3076 Last » Next »