- Computing and Information Systems - Research Publications
Computing and Information Systems - Research Publications
Permanent URI for this collection
25 results
Filters
Reset filtersSettings
Statistics
Citations
Search Results
Now showing
1 - 10 of 25
-
ItemDoes Domberger's theory of 'The Contracting Organization' explain why organizations outsource IT and the levels of satisfaction achieved?Seddon, PB ; Cullen, S ; Willcocks, LP (TAYLOR & FRANCIS LTD, 2007-07)
-
ItemComparative analysis of long DNA sequences by per element information content using different contextsDix, TI ; Powell, DR ; Allison, L ; Bernal, J ; Jaeger, S ; Stern, L (BMC, 2007)BACKGROUND: Features of a DNA sequence can be found by compressing the sequence under a suitable model; good compression implies low information content. Good DNA compression models consider repetition, differences between repeats, and base distributions. From a linear DNA sequence, a compression model can produce a linear information sequence. Linear space complexity is important when exploring long DNA sequences of the order of millions of bases. Compressing a sequence in isolation will include information on self-repetition. Whereas compressing a sequence Y in the context of another X can find what new information X gives about Y. This paper presents a methodology for performing comparative analysis to find features exposed by such models. RESULTS: We apply such a model to find features across chromosomes of Cyanidioschyzon merolae. We present a tool that provides useful linear transformations to investigate and save new sequences. Various examples illustrate the methodology, finding features for sequences alone and in different contexts. We also show how to highlight all sets of self-repetition features, in this case within Plasmodium falciparum chromosome 2. CONCLUSION: The methodology finds features that are significant and that biologists confirm. The exploration of long information sequences in linear time and space is fast and the saved results are self documenting.
-
ItemManaging Outsourcing: The Life Cycle ImperativeCULLEN, SK ; SEDDON, PB ; WILLCOCKS, L ( 2005)
-
ItemDecoding prefix codesLiddell, M ; Moffat, A (WILEY-BLACKWELL, 2006-12)
-
ItemOntological Foundations of Representational Information SystemsMILTON, S ( 2007)
-
ItemOn incorporating differentiated levels of network service into GridSimSulistio, A ; Poduval, G ; Buyya, R ; Tham, C-K (ELSEVIER, 2007-05)
-
ItemPatterns based classifiersRamamohanarao, K ; Fan, H (SPRINGER, 2007-03)
-
ItemBlock Merging for Off-Line CompressionWAN, R. ; MOFFAT, A. ( 2007)
-
ItemSurvey of network-based defense mechanisms countering the DoS and DDoS problemsPeng, T ; Leckie, C ; Ramamohanarao, K (ASSOC COMPUTING MACHINERY, 2007-04)This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service attacks. We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense mechanism. We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.
-
ItemAutomatic acquisition of qualia structure from corpus dataYamada, I ; Baldwin, T ; Sumiyoshi, H ; Shibata, M ; Yagi, N (IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, 2007-10)
- «
- 1 (current)
- 2
- 3
- »