Sciweavers

6530 search results - page 1279 / 1306
» Application Integration
Sort
View
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 10 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 10 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 10 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
BMCBI
2006
132views more  BMCBI 2006»
14 years 10 months ago
Length-dependent prediction of protein intrinsic disorder
Background: Due to the functional importance of intrinsically disordered proteins or protein regions, prediction of intrinsic protein disorder from amino acid sequence has become ...
Kang Peng, Predrag Radivojac, Slobodan Vucetic, A....
« Prev « First page 1279 / 1306 Last » Next »