Sciweavers

283 search results - page 1 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ICARIS
2004
Springer
13 years 10 months ago
Exploiting Immunological Properties for Ubiquitous Computing Systems
The immune system exhibits properties such as learning, distributivity continual adaptation, context dependent response and memory during the lifetime of a host. This paper argues ...
Philipp H. Mohr, Nick Ryan, Jon Timmis
BMCBI
2008
100views more  BMCBI 2008»
13 years 4 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
WORDS
2003
IEEE
13 years 10 months ago
Middleware Support for Embedded Software with Multiple QoS Properties for Ubiquitous Computing Environments
Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Stephen S. Yau, Yu Wang, Dazhi Huang
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
ICARIS
2003
Springer
13 years 10 months ago
A Danger Theory Inspired Approach to Web Mining
Within immunology, new theories are constantly being proposed that challenge current ways of thinking. These include new theories regarding how the immune system responds to pathog...
Andrew Secker, Alex Alves Freitas, Jon Timmis