Sciweavers

2826 search results - page 427 / 566
» A resource-based analysis of IT sourcing
Sort
View
IROS
2009
IEEE
195views Robotics» more  IROS 2009»
15 years 8 months ago
System design of an Insertable Robotic Effector Platform for Single Port Access (SPA) Surgery
—This paper presents a novel design and preliminary kinematic analysis of an Insertable Robotic Effector Platform (IREP) for Single Port Access (SPA) Surgery. The IREP robot can ...
Kai Xu 0005, Roger E. Goldman, Jienan Ding, Peter ...
123
Voted
ADHOCNOW
2009
Springer
15 years 8 months ago
TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions
In Multi Hop Wireless Networks (MHWNs), nodes act both as end-hosts as well as intermediate routers. When communication occurs, these nodes form chains between different sources a...
Adnan Majeed, Saquib Razak, Nael B. Abu-Ghazaleh, ...
WABI
2009
Springer
162views Bioinformatics» more  WABI 2009»
15 years 8 months ago
Aligning Biomolecular Networks Using Modular Graph Kernels
Comparative analysis of biomolecular networks constructed using measurements from different conditions, tissues, and organisms offer a powerful approach to understanding the stru...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
130
Voted
CIKM
2009
Springer
15 years 8 months ago
Packing the most onto your cloud
Parallel dataflow programming frameworks such as Map-Reduce are increasingly being used for large scale data analysis on computing clouds. It is therefore becoming important to a...
Ashraf Aboulnaga, Ziyu Wang, Zi Ye Zhang
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 8 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton