Sciweavers

3706 search results - page 690 / 742
» The Transformational Approach to Program Development
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 7 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
CORR
2007
Springer
104views Education» more  CORR 2007»
13 years 7 months ago
Searching for low weight pseudo-codewords
— Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density Parity Check (LDPC) codes are discussed. We summarize results of instanton/pseudo-codeword approach...
Michael Chertkov, Mikhail G. Stepanov
JCC
2008
132views more  JCC 2008»
13 years 7 months ago
The implementation of a fast and accurate QM/MM potential method in Amber
Abstract: Version 9 of the Amber simulation programs includes a new semi-empirical hybrid QM/MM functionality. This includes support for implicit solvent (generalized Born) and for...
Ross C. Walker, Michael F. Crowley, David A. Case
JCC
2008
105views more  JCC 2008»
13 years 7 months ago
Retrieval of spectral and dynamic properties from two-dimensional infrared pump-probe experiments
Abstract: We have developed a fitting algorithm able to extract spectral and dynamic properties of a three level oscillator from a two-dimensional infrared spectrum (2D-IR) detecte...
Riccardo Chelli, Victor V. Volkov, Roberto Righini
JSAC
2006
143views more  JSAC 2006»
13 years 7 months ago
Capacity and QoS for a Scalable Ring-Based Wireless Mesh Network
The wireless mesh network (WMN) is an economical solution to support ubiquitous broadband services. This paper investigates the tradeoffs among quality-of-service (QoS), capacity, ...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang