Sciweavers

14704 search results - page 2920 / 2941
» computer 2007
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 10 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ADHOC
2010
292views more  ADHOC 2010»
13 years 10 months ago
Sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm
We investigate the problem of sleep/wake scheduling for low duty cycle sensor networks. Our work differs from prior work in that we explicitly consider the effect of synchronizati...
Yan Wu, Sonia Fahmy, Ness B. Shroff
AI
2010
Springer
13 years 10 months ago
Optimal query complexity bounds for finding graphs
We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of ...
Sung-Soon Choi, Jeong Han Kim
AES
2007
Springer
75views Cryptology» more  AES 2007»
13 years 10 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
BMCBI
2008
121views more  BMCBI 2008»
13 years 10 months ago
ReAlignerV: Web-based genomic alignment tool with high specificity and robustness estimated by species-specific insertion sequen
Background: Detecting conserved noncoding sequences (CNSs) across species highlights the functional elements. Alignment procedures combined with computational prediction of transc...
Hisakazu Iwama, Yukio Hori, Kensuke Matsumoto, Koj...
« Prev « First page 2920 / 2941 Last » Next »