Sciweavers

804 search results - page 160 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
NETWORK
2006
218views more  NETWORK 2006»
13 years 5 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
JASIS
2007
128views more  JASIS 2007»
13 years 5 months ago
The changing nature of information work in museums
This paper presents results from twenty-one semi-structured interviews with museum information professionals (MIPs) who were asked about their experiences working with information...
Paul F. Marty
IEEEMM
2002
466views more  IEEEMM 2002»
13 years 5 months ago
Measuring Web Application Quality with WebQEM
measuring the product's "lower abstraction attributes."5 We see attributes as measurable properties of an entity--here, a Web application--and propose using a qualit...
Luis Olsina, Gustavo Rossi
IMC
2010
ACM
13 years 3 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
BMCBI
2010
106views more  BMCBI 2010»
13 years 10 days ago
Identification and correction of previously unreported spatial phenomena using raw Illumina BeadArray data
Background: A key stage for all microarray analyses is the extraction of feature-intensities from an image. If this step goes wrong, then subsequent preprocessing and processing s...
Mike L. Smith, Mark J. Dunning, Simon Tavaré...