Sciweavers

10899 search results - page 2096 / 2180
» The GP Programming System
Sort
View
LISA
2000
13 years 9 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
WSC
1997
13 years 9 months ago
Covalidation of Dissimilarly Structured Models
A methodology is presented which allows comparison between models under different modeling paradigms. Consider the following situation: Two models have been constructed to study d...
Samuel A. Wright, Kenneth W. Bauer Jr.
NIPS
1996
13 years 9 months ago
Multidimensional Triangulation and Interpolation for Reinforcement Learning
Dynamic Programming, Q-learning and other discrete Markov Decision Process solvers can be applied to continuous d-dimensional state-spaces by quantizing the state space into an arr...
Scott Davies
BMCBI
2008
126views more  BMCBI 2008»
13 years 7 months ago
NITPICK: peak identification for mass spectrometry data
Background: The reliable extraction of features from mass spectra is a fundamental step in the automated analysis of proteomic mass spectrometry (MS) experiments. Results: This co...
Bernhard Y. Renard, Marc Kirchner, Hanno Steen, Ju...
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
DOVIS: an implementation for high-throughput virtual screening using AutoDock
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
« Prev « First page 2096 / 2180 Last » Next »