Sciweavers

416 search results - page 76 / 84
» Some new approaches for preventing software tampering
Sort
View
CIKM
2007
Springer
14 years 1 months ago
Effective top-k computation in retrieving structured documents with term-proximity support
Modern web search engines are expected to return top-k results efficiently given a query. Although many dynamic index pruning strategies have been proposed for efficient top-k com...
Mingjie Zhu, Shuming Shi, Mingjing Li, Ji-Rong Wen
BMCBI
2011
12 years 11 months ago
FFCA: a feasibility-based method for flux coupling analysis of metabolic networks
Background: Flux coupling analysis (FCA) is a useful method for finding dependencies between fluxes of a metabolic network at steady-state. FCA classifies reactions into subsets (...
László Dávid, Sayed-Amir Mara...
BMCBI
2007
93views more  BMCBI 2007»
13 years 7 months ago
SVM-Fold: a tool for discriminative multi-class protein fold and superfamily recognition
Background: Predicting a protein’s structural class from its amino acid sequence is a fundamental problem in computational biology. Much recent work has focused on developing ne...
Iain Melvin, Eugene Ie, Rui Kuang, Jason Weston, W...
COMSWARE
2007
IEEE
14 years 1 months ago
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks based on Coverage by Two-Hop Neighbors
— In this paper, we focus on the construction of an efficient dominating set in ad hoc and sensor networks. A set of nodes is said to be dominating if each node is either itself...
François Ingelrest, David Simplot-Ryl, Ivan...
SIMUTOOLS
2008
13 years 8 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...