Sciweavers

21490 search results - page 3965 / 4298
» Business Process Modeling
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
15 years 4 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
Access-Network Association Policies for Media Streaming in Heterogeneous Environments
Abstract--We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective ...
Ali ParandehGheibi, Muriel Médard, Asuman E...
COMPUTER
2008
66views more  COMPUTER 2008»
15 years 4 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
15 years 4 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
CONSTRAINTS
2008
78views more  CONSTRAINTS 2008»
15 years 4 months ago
Boosting Haplotype Inference with Local Search
Abstract. A very challenging problem in the genetics domain is to infer haplotypes from genotypes. This process is expected to identify genes affecting health, disease and response...
Inês Lynce, João Marques-Silva, Steve...
« Prev « First page 3965 / 4298 Last » Next »