Sciweavers

1626 search results - page 189 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
BMCBI
2004
177views more  BMCBI 2004»
13 years 8 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
GLOBECOM
2007
IEEE
14 years 2 months ago
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks
— Link and node reliability are important metrics in wireless ad hoc networks. Therefore, evaluating and quantifying reliability has become the cornerstone of research in this ï¬...
Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu
ICRA
2006
IEEE
60views Robotics» more  ICRA 2006»
14 years 2 months ago
Mechanism of Micro Manipulation using Oscillation
— In this paper, we analyze the mechanism of the phenomenon between an endeffector, a micro object and a substrate during a micro manipulation. In a micro range, the attracting f...
Tetsuyoh Watanabe, Zhongwei Jiang
FM
1997
Springer
258views Formal Methods» more  FM 1997»
14 years 7 days ago
Consistent Graphical Specification of Distributed Systems
: The widely accepted possible benefits of formal methods on the one hand and their minor use compared to informal or graphical description techniques on the other hand have repeat...
Franz Huber, Bernhard Schätz, Geralf Einert