Sciweavers

43264 search results - page 8156 / 8653
» Comparing models of computation
Sort
View
COLCOM
2005
IEEE
15 years 9 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
CRV
2005
IEEE
191views Robotics» more  CRV 2005»
15 years 9 months ago
Automated Behavioral Phenotype Detection and Analysis Using Color-Based Motion Tracking
The problem of elucidating the functional significance of genes is a key challenge of modern science. Solving this problem can lead to fundamental advancements across multiple are...
Alan Shimoide, Ilmi Yoon, Megumi Fuse, Holly C. Be...
128
Voted
CSB
2005
IEEE
161views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Data Integration in the Mouse Genome Informatics (MGI) Database
The Mouse Genome Informatics (MGI) Database at The Jackson Laboratory provides a comprehensive public resource about the laboratory mouse. MGI curated data types include gene repr...
Donnie Qi, Judith A. Blake, James A. Kadin, Joel E...
EDOC
2005
IEEE
15 years 9 months ago
Improving IT Management at the BMW Group by Integrating Existing IT Management Processes
The management of IT landscapes consisting of thousands of business applications, different middleware systems, and supporting various business processes is a challenge for modern...
Florian Fischer, Florian Matthes, André Wit...
EEE
2005
IEEE
15 years 9 months ago
SLA Representation, Management and Enforcement
As the IT industry is becoming more and more interested in service oriented business models and upcoming technologies like Web Services or Grid Computing, the need for automated c...
Adrian Paschke, Martin Bichler
« Prev « First page 8156 / 8653 Last » Next »