Sciweavers

21876 search results - page 3988 / 4376
» Computer game-flow design
Sort
View
JUCS
2006
109views more  JUCS 2006»
15 years 5 months ago
4M - Software for Modelling and Analysing Cropping Systems
: Models have played an important role in scientific research for a long time. The crop models try to simulate the functioning of the atmosphere-soil-plant system with the help of ...
Nándor Fodor
JUCS
2006
114views more  JUCS 2006»
15 years 5 months ago
Pseudorandom Number Generation: Impossibility and Compromise
Abstract: Pseudorandom number generators are widely used in the area of simulation. Defective generators are still widely used in standard library programs, although better pseudor...
Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, ...
151
Voted
JWSR
2006
114views more  JWSR 2006»
15 years 5 months ago
Metadata, Ontologies, and Information Models for Grid PSE Toolkits Based on Web Services
: A PSE toolkit is a group of technologies within a software architecture through which multiple PSEs can be built for different application domains. The effective use of a PSE too...
Carmela Comito, Carlo Mastroianni, Domenico Talia
166
Voted
NAR
2008
101views more  NAR 2008»
15 years 5 months ago
PVS: a web server for protein sequence variability analysis tuned to facilitate conserved epitope discovery
We have developed PVS (Protein Variability Server), a web-based tool that uses several variability metrics to compute the absolute site variability in multiple protein-sequence al...
Maria Garcia-Boronat, Carmen M. Diez-Rivero, Ellis...
NETWORK
2008
94views more  NETWORK 2008»
15 years 5 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
« Prev « First page 3988 / 4376 Last » Next »