Sciweavers

5511 search results - page 905 / 1103
» Security for Network Places
Sort
View
BIOINFORMATICS
2004
83views more  BIOINFORMATICS 2004»
15 years 4 months ago
Haplotypes histories as pathways of recombinations
Motivation: The diversity of a haplotype, represented as a string of polymorphic sites along a DNA sequence, increases exponentially with the number of sites if recombinations are...
Nadia El-Mabrouk, Damian Labuda
RE
2002
Springer
15 years 3 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
IFM
2010
Springer
113views Formal Methods» more  IFM 2010»
15 years 2 months ago
Translating Pi-Calculus into LOTOS NT
Process calculi supporting mobile communication, such as the π-calculus, are often seen as an evolution of classical value-passing calculi, in which communication between processe...
Radu Mateescu, Gwen Salaün
INTERNET
2010
89views more  INTERNET 2010»
15 years 2 months ago
Plenty of Room Outside the Firm
away the still primitive state and expense of computers and foresee the potential of computers that were many times more powerful and cheap. More importantly, Engelbart was much be...
Charles J. Petrie
MP
2010
99views more  MP 2010»
15 years 2 months ago
Separation, dimension, and facet algorithms for node flow polyhedra
Abstract; Dedicated to Alan J. Hoffman Ball et al. propose a graph model for material compatibility constraints for products such as PCs made from components, where each componen...
Maren Martens, S. Thomas McCormick, Maurice Queyra...