Sciweavers

144227 search results - page 28691 / 28846
» Using the
Sort
View
126
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 9 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
142
Voted
JAIR
2011
124views more  JAIR 2011»
14 years 9 months ago
Second-Order Consistencies
In this paper, we propose a comprehensive study of second-order consistencies (i.e., consistencies identifying inconsistent pairs of values) for constraint satisfaction. We build ...
Christophe Lecoutre, Stéphane Cardon, Julie...
JBI
2011
233views Bioinformatics» more  JBI 2011»
14 years 9 months ago
A set of ontologies to drive tools for the control of vector-borne diseases
We are developing a set of ontologies that deal with vector-borne diseases and the arthropod vectors that transmit them. For practical reasons (application priorities), we initiat...
Pantelis Topalis, Emmanuel Dialynas, Elvira Mitrak...
99
Voted
JCNS
2011
87views more  JCNS 2011»
14 years 9 months ago
Information-geometric measure of 3-neuron firing patterns characterizes scale-dependence in cortical networks
To understand the functional connectivity of neural networks, it is important to develop simple and incisive descriptors of multineuronal firing patterns. Analysis at the pairwise...
Ifije E. Ohiorhenuan, Jonathan D. Victor
133
Voted
JCST
2011
89views more  JCST 2011»
14 years 9 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
« Prev « First page 28691 / 28846 Last » Next »