Sciweavers

7741 search results - page 1532 / 1549
» Security in Active Networks
Sort
View
TELSYS
2002
128views more  TELSYS 2002»
13 years 8 months ago
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: singlesource, shortest-path trees and shared, core-based trees. Core-based multicas...
Daniel Zappala, Aaron Fabbri, Virginia Mary Lo
BPSC
2010
194views Business» more  BPSC 2010»
13 years 8 months ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
ICMLA
2010
13 years 7 months ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
ISW
2010
Springer
13 years 6 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
BMCBI
2010
100views more  BMCBI 2010»
13 years 6 months ago
New insights into protein-protein interaction data lead to increased estimates of the S. cerevisiae interactome size
Background: As protein interactions mediate most cellular mechanisms, protein-protein interaction networks are essential in the study of cellular processes. Consequently, several ...
Laure Sambourg, Nicolas Thierry-Mieg
« Prev « First page 1532 / 1549 Last » Next »