Sciweavers

547 search results - page 91 / 110
» Supporting Requirements Analysis in Tropos: A Planning-Based...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
GECCO
2007
Springer
194views Optimization» more  GECCO 2007»
14 years 2 months ago
Hybrid coevolutionary algorithms vs. SVM algorithms
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
Rui Li, Bir Bhanu, Krzysztof Krawiec
LCN
2000
IEEE
14 years 8 days ago
On Integrating Differentiated Services and UMTS Networks
Differentiated Services (DS) is currently the major approach discussed to provide network layer service differentiation in IP networks. However, the discussion mainly addresses ï¬...
Jörg Diederich, Thorsten Lohmar, Martina Zitt...
BMCBI
2005
101views more  BMCBI 2005»
13 years 7 months ago
TmaDB: a repository for tissue microarray data
Background: Tissue microarray (TMA) technology has been developed to facilitate large, genome-scale molecular pathology studies. This technique provides a high-throughput method f...
Archana Sharma-Oates, Philip Quirke, David R. West...
IEEEVAST
2010
13 years 2 months ago
Finding and visualizing relevant subspaces for clustering high-dimensional astronomical data using connected morphological opera
Data sets in astronomy are growing to enormous sizes. Modern astronomical surveys provide not only image data but also catalogues of millions of objects (stars, galaxies), each ob...
Bilkis J. Ferdosi, Hugo Buddelmeijer, Scott Trager...