Sciweavers

3229 search results - page 619 / 646
» Theories with the Independence Property
Sort
View
NDSS
2008
IEEE
14 years 5 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
CISS
2007
IEEE
14 years 5 months ago
Differential Space-Frequency Group Codes for MIMO-OFDM
— In recent years, coherent space-frequency (SF) coded multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems have attracted great attentio...
Engin Zeydan, Ufuk Tureli
SECON
2007
IEEE
14 years 5 months ago
Robust Routing and Scheduling in Wireless Mesh Networks
—Joint routing-and-scheduling has been considered in wireless mesh networks for its significant performance improvement. While existing work assumes it, accurate traffic inform...
Wei Wang, Xin Liu, Dilip Krishnaswamy
APN
2007
Springer
14 years 5 months ago
ProM 4.0: Comprehensive Support for Real Process Analysis
This tool paper describes the functionality of ProM. Version 4.0 of ProM has been released at the end of 2006 and this version reflects recent achievements in process mining. Proc...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
GECCO
2007
Springer
165views Optimization» more  GECCO 2007»
14 years 5 months ago
Peptide detectability following ESI mass spectrometry: prediction using genetic programming
The accurate quantification of proteins is important in several areas of cell biology, biotechnology and medicine. Both relative and absolute quantification of proteins is often d...
David C. Wedge, Simon J. Gaskell, Simon J. Hubbard...