Sciweavers

2468 search results - page 245 / 494
» Aggregation operators 2003
Sort
View
CAINE
2007
15 years 2 months ago
Systems Modeling of Alveolar Morphogenesis In Vitro
We present a pulmonary alveolar epithelial cell model and its simulation results aimed to provide mechanistic insight into biological principles that underlie alveolar morphogenes...
Sean H. J. Kim, Sunwoo Park, Wei Yu, Keith E. Most...
118
Voted
DGO
2007
150views Education» more  DGO 2007»
15 years 2 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
114
Voted
ISSA
2004
15 years 2 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
95
Voted
USENIX
2001
15 years 2 months ago
The X Resize and Rotate Extension - RandR
The X Window System protocol, Version 11, was deliberately designed to be extensible, to provide for both anticipated and unanticipated needs. The X11 core did not anticipate that...
Jim Gettys, Keith Packard
93
Voted
MOBICOM
2010
ACM
15 years 28 days ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...