Sciweavers

1628 search results - page 192 / 326
» {Performance Modeling and Evaluation of Large-Scale J2EE App...
Sort
View
BMCBI
2008
172views more  BMCBI 2008»
15 years 27 days ago
Compo: composite motif discovery using discrete models
Background: Computational discovery of motifs in biomolecular sequences is an established field, with applications both in the discovery of functional sites in proteins and regula...
Geir Kjetil Sandve, Osman Abul, Finn Drablø...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
WSC
2008
15 years 3 months ago
Preventive what-if analysis in symbiotic simulation
The what-if analysis process is essential in symbiotic simulation systems. It is responsible for creating a number of alternative what-if scenarios and evaluating their performanc...
Heiko Aydt, Stephen John Turner, Wentong Cai, Malc...
162
Voted
WWIC
2007
Springer
247views Communications» more  WWIC 2007»
15 years 7 months ago
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications without relying on significant infrastructure. Many of these applications benefit from multi-h...
Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Micha...
110
Voted
IPPS
2006
IEEE
15 years 6 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...