Sciweavers

1460 search results - page 287 / 292
» Very Lightweight Requirements Modeling
Sort
View
BMCBI
2007
136views more  BMCBI 2007»
13 years 8 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
CN
2007
137views more  CN 2007»
13 years 8 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
IJBRA
2007
120views more  IJBRA 2007»
13 years 8 months ago
The myGrid ontology: bioinformatics service discovery
: In this paper we explore issues in the development of the my Grid ontology, which is an OWL ontology designed to support service discovery through service annotation. There are c...
Katy Wolstencroft, Pinar Alper, Duncan Hull, Chris...
TASE
2008
IEEE
13 years 8 months ago
Lean Buffering in Serial Production Lines With Nonidentical Exponential Machines
Lean buffering is the smallest buffer capacity, which is necessary and sufficient to ensure the desired production rate of a manufacturing system. Literature offers methods for des...
Shu-Yin Chiang, Alexander Hu, Semyon M. Meerkov