Sciweavers

2340 search results - page 405 / 468
» Second quarter 2008
Sort
View
SCFBM
2008
119views more  SCFBM 2008»
13 years 9 months ago
Permutation - based statistical tests for multiple hypotheses
Background: Genomics and proteomics analyses regularly involve the simultaneous test of hundreds of hypotheses, either on numerical or categorical data. To correct for the occurre...
Anyela Camargo, Francisco Azuaje, Haiying Wang, Hu...
TON
2008
108views more  TON 2008»
13 years 9 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
FUIN
2008
108views more  FUIN 2008»
13 years 8 months ago
Learning Ground CP-Logic Theories by Leveraging Bayesian Network Learning Techniques
Causal relations are present in many application domains. Causal Probabilistic Logic (CP-logic) is a probabilistic modeling language that is especially designed to express such rel...
Wannes Meert, Jan Struyf, Hendrik Blockeel
JEI
2008
109views more  JEI 2008»
13 years 8 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
JSAC
2008
109views more  JSAC 2008»
13 years 8 months ago
Elastic service availability: utility framework and optimal provisioning
Service availability is one of the most closely scrutinized metrics in offering network services. It is important to cost-effectively provision a managed and differentiated networ...
Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderba...