Now showing items 13-21 of 21

  • [2010-06-28] Markov random field modeling of the spatial distribution of proteins on cell membranes 

    Zhang, Jun
    Cell membranes display a range of receptors that bind ligands and activate signaling pathways. Signaling is characterized by dramatic changes in membrane molecular topography, including the co-clustering of receptors with ...
  • [2013-01-31] Methods for speculatively bootstrapping better intrusion detection system performance 

    Fugate, Sunny
    During the last three decades, the designers of computer IDSs have been continuously challenged with performance bottlenecks and scalability issues. The number of threats is enormous. The performance of ID systems depends ...
  • [2013-01-31] Multivalent Random Walkers:A computational model of superdiffusive transport at the nanoscale 

    Olah, Mark Joseph
    We present a stochastic model and numerical simulation framework for a synthetic nanoscale walker that can be used to transport materials and information at superdiffusive rates in artificial molecular systems. Our ...
  • [2011-08-31] Parallel network protocol stacks using replication 

    Sizemore, Charles Donour
    Computing applications demand good performance from networking systems. This includes high-bandwidth communication using protocols with sophisticated features such as ordering, reliability, and congestion control. Much of ...
  • [2012-07-05] Privacy-preserving techniques for computer and network forensics 

    Shebaro, Bilal
    Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom-friendly environment that protects their privacy ...
  • [2010-06-28] A protocol reconfiguration and optimization system for MPI 

    Gorentla Venkata, Manjunath
    Modern high performance computing (HPC) applications, for example adaptive mesh refinement and multi-physics codes, have dynamic communication characteristics which result in poor performance on current Message Passing ...
  • [2010-09-09] Security in network games 

    Navin, Rustagi
    Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. ...
  • [2010-02-09] Term rewriting with built-in numbers and collection data structures 

    Falke, Stephan
    Term rewrite systems have been extensively used in order to model computer programs for the purpose of formal verification. This is in particular true if the termination behavior of computer programs is investigated, and ...
  • [2011-02-09] Three algorithms for causal learning 

    Rammohan, Roshan Ram
    The field of causal learning has grown in the past decade, establishing itself as a major focus in artificial intelligence research. Traditionally, approaches to causal learning are split into two areas. One area involves ...