Sciweavers

1361 search results - page 272 / 273
» From Legacy to Web through Interaction Modeling
Sort
View
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
13 years 9 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
BMCBI
2005
126views more  BMCBI 2005»
13 years 5 months ago
GANN: Genetic algorithm neural networks for the detection of conserved combinations of features in DNA
Background: The multitude of motif detection algorithms developed to date have largely focused on the detection of patterns in primary sequence. Since sequence-dependent DNA struc...
Robert G. Beiko, Robert L. Charlebois
MOBIHOC
2005
ACM
14 years 5 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula
MOBILITY
2009
ACM
13 years 12 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
13 years 12 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov